Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python post exploitation
post-exploitation
x
python
x
47 search results found
Fsociety
⭐
10,082
fsociety Hacking Tools Pack – A Penetration Testing Framework
Byob
⭐
8,681
An open-source post-exploitation framework for students, researchers and developers.
Pupy
⭐
7,889
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Ghost
⭐
2,400
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Evilosx
⭐
2,115
An evil RAT (Remote Administration Tool) for macOS / OS X.
Silenttrinity
⭐
2,087
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Phpsploit
⭐
2,000
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Poshc2
⭐
1,645
A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
Pyexfil
⭐
736
A Python Package for Data Exfiltration
Blackmamba
⭐
688
C2/post-exploitation framework
Powerhub
⭐
680
A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Covertutils
⭐
412
A framework for Backdoor development!
Pth Toolkit
⭐
348
Modified version of the passing-the-hash tool collection made to work straight out of the box
Mssqlproxy
⭐
329
mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse
Pyiris
⭐
308
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Extractbitlockerkeys
⭐
254
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Enumdb
⭐
215
Relational database brute force and post exploitation tool for MySQL and MSSQL
Herakeylogger
⭐
214
Chrome Keylogger Extension | Post Exploitation Tool
Sshimpanzee
⭐
211
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
Poet
⭐
185
[unmaintained] Post-exploitation tool
Xena
⭐
175
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ultimate Botnet kit.
Scavenger
⭐
173
scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders as well as "interesting" files containing sensitive information.
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Punk.py
⭐
94
unix SSH post-exploitation 1337 tool
Seashell
⭐
94
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Pythonrat
⭐
92
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
Rpc2socks
⭐
91
Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Jawfish
⭐
72
Tool for breaking into web applications.
Boomer
⭐
71
Framework for exploiting local vulnerabilities
Intersect 2.5
⭐
58
Post-Exploitation Framework
Venus
⭐
53
A Visual Studio Code Extension agent for Mythic C2
Backtome
⭐
50
Little tool made in python to create payloads for Linux, Windows and OSX with unique handler
Reave
⭐
50
WIP Post-exploitation framework tailored for hypervisors.
Shennina
⭐
46
Automating Host Exploitation with AI
C2pe
⭐
34
C2 and Post Exploitation Code
Bifrost
⭐
34
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
Adbnet
⭐
32
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Macos Wpa Psk
⭐
30
PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Deathnote
⭐
26
🔥 Pentest Cheat Sheet
Uzi
⭐
25
A Distinctive Ransomeware.
Dfex
⭐
23
DNS File EXfiltration
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
C2_server
⭐
14
C2 server to connect to a victim machine via reverse shell
6 Eyed Spider
⭐
14
Post-exploitation tool collects data going out and coming into the browser and makes use of it.
Chrome_enum
⭐
13
Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.
Shellord
⭐
11
ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java
Urchin
⭐
7
🐚💥 Python socket remote shell that lets you connect to others computers through the shell when they run the client.
Cannon
⭐
6
Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse shells, and many more.
Auto Postxploit
⭐
5
Windows Auto Post Exploitation - For ReD Team
Related Searches
Python Flask (17,643)
Python Machine Learning (14,099)
Python Command Line (13,351)
Python Network (11,495)
Python Plugin (9,263)
Python Server (7,793)
Python Search (5,943)
Python Shell (5,055)
Python Language (4,480)
Python Mysql (3,762)
1-47 of 47 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.