Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for shell red team
red-team
x
shell
x
26 search results found
Nishang
⭐
7,771
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Awesome Hacker Search Engines
⭐
6,307
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
Venom
⭐
1,403
venom - C2 shellcode generator/compiler/handler
Platypus
⭐
1,372
🔨 A modern multiple reverse shell sessions manager written in go
A Red Teamer Diaries
⭐
1,294
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Pi Pwnbox Rogueap
⭐
1,263
Homemade Pwnbox 🚀 / Rogue AP 📡 based on Raspberry Pi — WiFi Hacking Cheatsheets + MindMap 💡
Goofuzz
⭐
1,119
GooFuzz is a tool to perform fuzzing with an OSINT approach, managing to enumerate directories, files, subdomains or parameters without leaving evidence on the target's server and by means of advanced Google searches (Google Dorking).
Inventory
⭐
1,019
Asset inventory of over 800 public bug bounty programs.
Ssh Snake
⭐
874
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Chashell
⭐
599
Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.
Pentmenu
⭐
382
A bash script for recon and DOS attacks
Hershell
⭐
367
Hershell is a simple TCP reverse shell written in Go.
Nac_bypass
⭐
220
Script collection to bypass Network Access Control (NAC, 802.1x)
Reverse Shell Cheatsheet
⭐
218
🙃 Reverse Shell Cheat Sheet 🙃
Cypheroth
⭐
202
Automated, extensible toolset that runs cypher queries against Bloodhound's Neo4j backend and saves output to spreadsheets.
D3m0n1z3dshell
⭐
193
Demonized Shell is an Advanced Tool for persistence in linux.
I See You
⭐
188
ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or phishing engagements. Using exact location coordinates an attacker can perform preliminary reconnaissance which will help them in performing further targeted attacks.
Xena
⭐
175
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring secrecy and resiliency over performance. It's micro-service oriented allowing for specialization and lower footprint. Join the community of the ultimate Botnet kit.
Crossc2kit
⭐
145
CrossC2 developed based on the Cobalt Strike framework can be used for other cross-platform system control. CrossC2Kit provides some interfaces for users to call to manipulate the CrossC2 Beacon session, thereby extending the functionality of Cobalt Strike.
Pounce Keys
⭐
136
PounceKey's is a Accessibility Service keylogger for Android 9 pie api 28 full launcher stealth. choose between recieving logs via IP, Gmail, or Discord. No txt files on device, straight buffer in logcat
Arno
⭐
116
An automation tool to install the most popular tools for bug bounty or pentesting.
Whoamifuck
⭐
109
用于Linux应急响应,快速排查异常用户登录情况和入侵信息排查,准确定位溯源时间线,高效辅助还原攻击
Smartrecon
⭐
102
smartrecon is a powerful shell script to automate the recon and finding common vulnerabilities for bug hunter
Sharpshellpipe
⭐
102
This lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.
Terminatorz
⭐
95
TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in your web applications.
Secfiles
⭐
94
My files for security assessments, bug bounty and other security related stuff
Lazypariah
⭐
90
A tool for generating reverse shell payloads on the fly.
Passdetective
⭐
85
PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Using regular expressions, it helps prevent accidental exposure of sensitive information in your command history.
Sub Drill
⭐
82
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements.
Activedirectoryattacktool
⭐
81
ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Controller. This tool is is best utilized using a set of known credentials against the host.
Mtkpi
⭐
81
🧰 Multi Tool Kubernetes Pentest Image
Reversepowershell
⭐
63
Functions that can be used to gain Reverse Shells with PowerShell
Awsdetonationlab
⭐
60
This script is used to generate some basic detections of the aws security services
Nativepayload_image
⭐
59
Transferring Backdoor Payloads with BMP Image Pixels
Postshell
⭐
57
PostShell - Post Exploitation Bind/Backconnect Shell
Ycsm
⭐
51
This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-Ex Tools (Cobalt Strike, Empire, Metasploit, PoshC2).
Nativepayload_bssid
⭐
48
Transferring Backdoor Payload by BSSID and Wireless traffic
Wifi Pineapple Cloner
⭐
47
Port WiFi Pineapple NANO/TETRA in generic hardware
Sherlock
⭐
46
This script is designed to help expedite a web application assessment by automating some of the assessment steps (e.g., running nmap, sublist3r, metasploit, etc.)
Ezea
⭐
45
EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
Gorsh
⭐
44
A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface
Sqlmutant
⭐
44
SQLMutant is a comprehensive SQL injection testing tool that provides several features to test for SQL injection vulnerabilities in web applications, uses various techniques to detect vulnerabilities, including pattern matching, error analysis, and timing attacks. The integration of Waybackurls and Arjun allows the tool to find additional
Hackarsenaltoolkit
⭐
39
Hacking arsenal. This script download the latest tools, wordlists, releases and install common hacking tools
Rt Cybershield
⭐
36
Protecting Red Team infrastructure with cyber shield blocking AWS/AZURE/IBM/Digital Ocean/TOR/AV IP/ETC. ranges
Scripts
⭐
35
One-off scripts
C2shell
⭐
32
C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.
Adversarial Threat Modelling
⭐
31
Supporting material for my presentation "Adversarial Threat Modelling — A Practical Approach to Purple Teaming in the Enterprise"
Catspin
⭐
29
Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway and deployed via AWS Cloudformation.
Ccdc
⭐
27
This contains the public CCDC materials for Cyber@UCR.
Deathnote
⭐
26
🔥 Pentest Cheat Sheet
Octopus
⭐
25
Octopus - Network Scan/Infos & Web Scan
Thremulation Station
⭐
24
Small-scale threat emulation and detection range built on Elastic and Atomic Redteam.
Sql Injection Pwn
⭐
19
A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty
Grizzlytunnel
⭐
18
GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.
S3 Buckets Aio Pwn
⭐
18
An AIO Tool to check for Vulnerable Amazon S3 Buckets as part of Bug Bounty, the uniqueness of this tool is that it can take a file full of buckets, and check all of them with various attack scenarios if they are vulnerable
Web Scanner
⭐
17
Escaner WEB que tiene como objetivo sacar toda la información posible como IP, CMS, Usuarios, posibles correos, rendimiento de la URL, Puertos Abiertos, Subdirectorios ... Etc.
Purple
⭐
16
scripts to setup environments for red/blue teams.
Thecollective
⭐
16
The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/TheCollective #infosec #redteaming #pentest
Nucleimonst3r
⭐
15
Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs and exploits but also gather all the technology running behind them for further investigation for a potential target.
Setips
⭐
14
Setup script for Red Teams
Bash Malware Dropper
⭐
12
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
Pointer
⭐
11
Pointer is a Fast Simple Lightweight Tool for Endpoint Discovery.
Oss
⭐
10
Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.
Ssrfpwned
⭐
8
Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSRF
Pentesting Bootstrap
⭐
8
Fast and easy way of setting up a hardened pentesting environment with Kali Linux
Purple Team Resources
⭐
8
A curated list of tools and resources that I use daily as a Purple-Team operator.
Dnskron
⭐
8
Fast DNS history enumeration tool for network and OSINT investigations
Phactive
⭐
7
Phactive - Monitoring an Environment with Nmap red teaming
Titanfall
⭐
6
Modular Linux dropper creation
Vishnu
⭐
6
Golang Port Knocking for Linux + Windows
Darkqr
⭐
6
DarkQR tiene como objetivo crear QRs para los usuarios, de esta forma, las empresas pueden aprovechar el máximo potencial de la misma a través de una sencilla e intuitiva ejecución con diversos parámetros.
Kali Sec
⭐
5
Repeatable, immutable, and scalable security research w/ Docker
Genavatar
⭐
5
This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
Related Searches
Shell Docker (20,660)
Shell Script (15,351)
Shell Bash (10,338)
Shell Command Line (6,542)
Shell Dotfiles (5,338)
Shell Git (4,715)
Shell Ansible (4,427)
Shell Server (3,563)
Shell Ssh (3,562)
Shell Docker Image (3,406)
1-26 of 26 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.