Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security post exploitation
post-exploitation
x
security
x
20 search results found
Hacker Roadmap
⭐
12,086
A collection of hacking tools, resources and references to practice ethical hacking.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Kubesploit
⭐
501
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
Alanframework
⭐
435
A C2 post-exploitation framework
Gtfonow
⭐
414
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Swap_digger
⭐
376
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Rspet
⭐
251
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.
Hrshell
⭐
242
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Fudgec2
⭐
236
FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.
Hatsploit
⭐
236
Modular penetration testing platform that enables you to write, test, and execute exploit code.
Poet
⭐
185
[unmaintained] Post-exploitation tool
Gtfo
⭐
76
Search for Unix binaries that can be exploited to bypass system security restrictions.
Jawfish
⭐
72
Tool for breaking into web applications.
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Linpwn
⭐
36
Interactive Post Exploitation Tool
C2pe
⭐
34
C2 and Post Exploitation Code
Ttps
⭐
17
Tactics, Techniques, and Procedures
Coyote
⭐
11
Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagements.
Dartrs
⭐
6
portable dart based reverse shell
Katanaframework
⭐
5
Katana-Framework это фреймворк для энтузиастов по тестированию на проникновение на данный момент еще находится в разработке.
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,910)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
1-20 of 20 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.