7 results found Sort:

139
981
unknown
17
Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit
Created 2023-04-27
16 commits to main branch, last one 11 months ago
Bash post exploitation toolkit
Created 2018-08-06
20 commits to master branch, last one about a year ago
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Created 2023-12-17
135 commits to main branch, last one 8 days ago
73
372
unknown
7
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Created 2021-07-06
33 commits to main branch, last one 3 years ago
Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypass infamous rkhunter antirootkit.
Created 2022-02-23
174 commits to main branch, last one about a year ago
The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromised backdoors, just like accessing an EC2 instance in the AWS cl...
Created 2023-12-28
25 commits to main branch, last one 7 months ago
12
50
gpl-3.0
2
WIP Post-exploitation framework tailored for hypervisors.
Created 2021-12-17
124 commits to main branch, last one about a year ago