7 results found Sort:

141
1.0k
unknown
17
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Created 2023-04-27
18 commits to main branch, last one 27 days ago
Bash post exploitation toolkit
Created 2018-08-06
20 commits to master branch, last one about a year ago
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Created 2023-12-17
135 commits to main branch, last one 2 months ago
75
379
unknown
7
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Created 2021-07-06
33 commits to main branch, last one 3 years ago
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Created 2022-02-23
174 commits to main branch, last one about a year ago
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cl...
Created 2023-12-28
25 commits to main branch, last one 9 months ago
12
50
gpl-3.0
2
WIP Post-exploitation framework tailored for hypervisors.
Created 2021-12-17
124 commits to main branch, last one about a year ago