Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for red team post exploitation toolkit
post-exploitation-toolkit
x
red-team
x
1 search results found
Vcenterkit
⭐
754
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Reveng_rtkit
⭐
181
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Reave
⭐
50
WIP Post-exploitation framework tailored for hypervisors.
C2 Cloud
⭐
10
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cloud. It can manage several simultaneous backdoor sessions with a user-friendly interface.
Related Searches
Security Red Team (149)
Security Tools Red Team (79)
C Red Team (39)
Python Post Exploitation Toolkit (4)
Penetration Testing Post Exploitation Toolkit (3)
1-1 of 1 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.