7 results found Sort:
- Filter by Primary Language:
- Python (5)
- C (1)
- Shell (1)
- +
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Created
2023-04-27
18 commits to main branch, last one about a month ago
Bash post exploitation toolkit
Created
2018-08-06
20 commits to master branch, last one about a year ago
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Created
2023-12-17
135 commits to main branch, last one 3 months ago
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Created
2021-07-06
33 commits to main branch, last one 3 years ago
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Created
2022-02-23
174 commits to main branch, last one about a year ago
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cl...
Created
2023-12-28
25 commits to main branch, last one 10 months ago
WIP Post-exploitation framework tailored for hypervisors.
Created
2021-12-17
124 commits to main branch, last one about a year ago