Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for post exploitation toolkit
post-exploitation-toolkit
x
7 search results found
Vcenterkit
⭐
754
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Bashark
⭐
712
Bash post exploitation toolkit
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Seashell
⭐
94
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Reave
⭐
50
WIP Post-exploitation framework tailored for hypervisors.
Adbnet
⭐
32
A tool that allows you to search for vulnerable android devices across the world and exploit them.
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Related Searches
Python Post Exploitation Toolkit (4)
Penetration Testing Post Exploitation Toolkit (3)
Red Team Post Exploitation Toolkit (3)
1-7 of 7 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.