Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python redteaming
python
x
redteaming
x
47 search results found
Wifiphisher
⭐
12,656
The Rogue Access Point Framework
Dirsearch
⭐
11,165
Web path scanner
Hoaxshell
⭐
2,678
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Malicious Pdf
⭐
2,029
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Slackpirate
⭐
717
Slack Enumeration and Extraction Tool - extract sensitive information from a Slack Workspace
Pyramid
⭐
515
a tool to help operate in EDRs' blind spots
C2concealer
⭐
501
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Aws Cloudsaga
⭐
406
AWS CloudSaga - Simulate security events in AWS
Power Pwn
⭐
370
An offensive and defensive security toolset for Microsoft 365 Power Platform
Offensive Reverse Shell Cheat Sheet
⭐
351
Collection of reverse shells for red team operations, penetration testing, and offensive security.
Gmailc2
⭐
350
A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions
Pyiris
⭐
308
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Evilginx3 Phishlets
⭐
268
Learn my systematic process of creating Evilginx Phishlets from scratch: https://www.simplerhacking.com
Pythonmemorymodule
⭐
265
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
Telegramrat
⭐
261
Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions
Reverse Shell Cheatsheet
⭐
218
🙃 Reverse Shell Cheat Sheet 🙃
Emailall
⭐
216
EmailAll is a powerful Email Collect tool — 一款强大的邮箱收集工具
Leakscraper
⭐
193
LeakScraper is an efficient set of tools to process and visualize huge text files containing credentials. Theses tools are designed to help penetration testers and redteamers doing OSINT by gathering credentials belonging to their target.
Excelntdonut
⭐
166
Excel 4.0 (XLM) Macro Generator for injecting DLLs and EXEs into memory.
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Ulexecve
⭐
141
ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teaming and anti-forensics purposes.
Synergy Httpx
⭐
106
A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).
Murmurhash
⭐
101
This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.
Arsenal
⭐
96
Offensive security tools weaponized
Mediator
⭐
91
An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.
Subevil
⭐
85
SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.
Window Rat
⭐
80
The purpose of this tool is to test the window10 defender protection and also other antivirus protection.
Tdc2023 Starter Kit
⭐
69
This is the starter kit for the Trojan Detection Challenge 2023 (LLM Edition), a NeurIPS 2023 competition.
Hacknetics
⭐
67
Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and high level strategy. One simple clone and you have access to some of the most popular tools used for pentesting.
Ipv6teal
⭐
65
👋 Stealthy data exfiltration via IPv6 covert channel
Fudshell
⭐
57
An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal
Wicrackfi
⭐
56
Python Script to help/automate the WiFi hacking exercises.
G3nius Tools Sploit
⭐
53
G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modular!
Htkit
⭐
41
Information Gathering Simplified.
Pyfud
⭐
36
CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)
Ensemble
⭐
33
A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting to scan multiple bug bounty programs simultaneously, on a recurring basis.
Fairplay
⭐
30
Artifact monitoring that ensures fairplay
Krakenrdi
⭐
24
Rapid Deployment Infrastructure for Red Teaming and Penetration Testing
Malicious Rmqr Codes
⭐
23
Collection of (4000+) malicious rMQR Codes for Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
Responder Parser
⭐
23
Most Responder's configuration power in your hand
Dpapick
⭐
19
Stegocracker
⭐
19
Stego is an open-source and free steganography tool that lets you hide your secret message in an image or audio file. You will not notice any change in the image or audio file. However, your secret message will be inside the original image or audio file
Bca Phantom
⭐
17
A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Moonshot
⭐
14
Moonshot - A simple and modular tool to evaluate and red-team any LLM application.
Wmiexec2
⭐
14
wmiexec2.0 is the same wmiexec that everyone knows and loves (debatable). This 2.0 version is obfuscated to avoid well known signatures from various AV engines. It also has a handful of additional built in modules to help automate some common tasks on Red team engagements.
Connect
⭐
14
Command and Control Framework
Palinka_c2
⭐
14
Just another useless C2 occupying space in some HDD somewhere.
Spotexfil
⭐
12
A simple way to exfiltrate data using spotify API
Blueprint
⭐
12
Templating with sinister modules
Useragent Fuzz Lib
⭐
12
User-agent Fuzzing Library. This repository holds data of all the user agents in the `user_agents.json` file, which can be used directly with any tool that can parse json format.
Blackheart
⭐
11
BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender restrictions. (FOR EDUCATIONAL PURPOSES!!)
Hack_hard
⭐
10
A nostalgic journey back to the era of retro RPGs with a cyber twist in the theme of Die Hard
Havocnotion
⭐
10
A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel.
Hacking Utilidades
⭐
9
Utilidades para facilitarnos el trabajo
Automated Cme Password Spraying
⭐
9
A script designed to test passwords against user accounts within an Active Directory environment, offering customizable Account Lockout Threshold and a Reset Account Lockout Counter.
Ironkit
⭐
8
Use IronPython directly in your code without IronPython DLLs and dependencies
Kraken Project
⭐
8
A scalable pentesting platform
Gh0stbust3rz
⭐
8
Build a C2 system while becoming a techie Gh0stbust3r! Learn real-world RedTeam skills and even earn a basic c2 by completing the game
Slacker
⭐
7
Python script for pulling chat history for Slack channels using a stolen API token.
Last
⭐
7
Linux Automated Security scanning Tool
Fudcrypt
⭐
6
GENERATE PYTHON BASED FUD STUB
Beryl
⭐
6
initial access payload injector through uac PE bypass windows defender
Lolcrawler
⭐
6
Headless web crawler for bugbounty and penetration-testing/redteaming
Redeval
⭐
6
Auditing with LLM evals for LLM applications.
Bustme
⭐
6
bustme is a directory brute forcing tool that assesses if pages exist according to the returned response body.
Luckycheck
⭐
5
Modular Privesc ToolBox Add or Remove Tools as you want just with 4 lines and 6 lines for making it looks good ;)
Titanii
⭐
5
C2 Server for pentesting, exploitation, and payload creation
Fishshell
⭐
5
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
Related Searches
Python Django (28,897)
Python Machine Learning (20,195)
Python Flask (17,643)
Python Dataset (14,792)
Python Docker (14,113)
Python Tensorflow (13,736)
Python Command Line (13,351)
Python Deep Learning (13,092)
Python Jupyter Notebook (12,976)
Python Network (11,495)
1-47 of 47 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.