Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python post exploitation
post-exploitation
x
python
x
29 search results found
Byob
⭐
8,681
An open-source post-exploitation framework for students, researchers and developers.
Pupy
⭐
7,889
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Evilosx
⭐
2,325
An evil RAT (Remote Administration Tool) for macOS / OS X.
Silenttrinity
⭐
2,238
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Powerhub
⭐
793
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Blackmamba
⭐
688
C2/post-exploitation framework
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Pyiris
⭐
329
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Mssqlproxy
⭐
329
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Fudgec2
⭐
249
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Enumdb
⭐
219
Relational database brute force and post exploitation tool for MySQL and MSSQL
Poet
⭐
185
[unmaintained] Post-exploitation tool
Scavenger
⭐
173
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Punk.py
⭐
94
unix SSH post-exploitation 1337 tool
Seashell
⭐
94
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Pythonrat
⭐
92
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Jawfish
⭐
72
Tool for breaking into web applications.
Boomer
⭐
71
Framework for exploiting local vulnerabilities
Intersect 2.5
⭐
58
Post-Exploitation Framework
Reave
⭐
50
WIP Post-exploitation framework tailored for hypervisors.
Backtome
⭐
50
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler
Shennina
⭐
46
Automating Host Exploitation with AI
C2pe
⭐
34
C2 and Post Exploitation Code
Dfex
⭐
23
DNS File EXfiltration
6 Eyed Spider
⭐
14
Post-exploitation tool collects data going out and coming into the browser and makes use of it.
C2_server
⭐
14
C2 server to connect to a victim machine via reverse shell
Chrome_enum
⭐
13
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
Shellord
⭐
11
ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java
Cannon
⭐
6
Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse shells, and many more.
Related Searches
Python Flask (17,643)
Python Machine Learning (14,099)
Python Command Line (13,351)
Python Network (11,495)
Python Plugin (9,263)
Python Server (7,793)
Python Search (5,943)
Python Shell (5,055)
Python Language (4,480)
Python Mysql (3,762)
1-29 of 29 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2025 Awesome Open Source. All rights reserved.