Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team post exploitation
post-exploitation
x
red-team
x
13 search results found
Viper
⭐
3,385
Redteam operation platform with webui 图形化红队行动辅助平台
Silenttrinity
⭐
2,087
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Phpsploit
⭐
2,000
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
Ligolo Ng
⭐
1,950
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Venom
⭐
1,403
venom - C2 shellcode generator/compiler/handler
Emp3r0r
⭐
1,151
Linux/Windows post-exploitation framework made by linux user
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Blackmamba
⭐
688
C2/post-exploitation framework
Go Shellcode
⭐
504
Load shellcode into a new process
Kubesploit
⭐
501
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Alanframework
⭐
435
A C2 post-exploitation framework
Pivotsuite
⭐
423
Network Pivoting Toolkit
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Forensia
⭐
377
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Hrshell
⭐
249
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Windowspy
⭐
234
WindowSpy is a Cobalt Strike Beacon Object File meant for automated and targeted user surveillance.
Covermyass
⭐
227
Post-exploitation tool to cover your tracks on a compromised machine
Sshimpanzee
⭐
211
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
Dns Persist
⭐
211
DNS-Persist is a post-exploitation agent which uses DNS for command and control.
Redpill
⭐
202
Assist reverse tcp shells in post-exploration tasks
Xena
⭐
175
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ultimate Botnet kit.
Eternalhushframework
⭐
167
EternalHush - new free advanced open-source c2 framework
Atomic Red Team Intelligence C2
⭐
163
ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.
Amnesiac
⭐
157
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Httpworker
⭐
74
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Awesome Cyber
⭐
65
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Reave
⭐
50
WIP Post-exploitation framework tailored for hypervisors.
C2pe
⭐
34
C2 and Post Exploitation Code
Bifrost
⭐
34
A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.
Aws Attack
⭐
32
AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, Pacu.
Macos Wpa Psk
⭐
30
PoC script showing that MacOS leaves the wireless key in NVRAM, in plaintext and accessible to anyone.
Deathnote
⭐
26
🔥 Pentest Cheat Sheet
Bifrost
⭐
21
Bifrost C2. Open-source post-exploitation using Discord API
Ttps
⭐
17
Tactics, Techniques, and Procedures
6 Eyed Spider
⭐
14
Post-exploitation tool collects data going out and coming into the browser and makes use of it.
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Sharpwatchdogs
⭐
5
Processes used to guard Red Team property against and watch for, unwanted or unexpected blue team actions.
Hermit
⭐
5
A post-exploitation, command and control framework written in Rust.
Auto Postxploit
⭐
5
Windows Auto Post Exploitation - For ReD Team
Related Searches
Penetration Testing Red Team (297)
1-13 of 13 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.