Trending repositories for topic post-exploitation
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring s...
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
An open-source post-exploitation framework for students, researchers and developers.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring s...
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
An open-source post-exploitation framework for students, researchers and developers.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
A collection of hacking tools, resources and references to practice ethical hacking.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
An open-source post-exploitation framework for students, researchers and developers.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring s...
A tool that allows you to search for vulnerable android devices across the world and exploit them.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring s...
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻
Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Chrome Keylogger Extension | Post Exploitation Tool
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
A collection of hacking tools, resources and references to practice ethical hacking.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
An open-source post-exploitation framework for students, researchers and developers.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
XENA is the managed remote administration platform for botnet creation & development powered by blockchain and machine learning. Aiming to provide an ecosystem which serves the bot herders. Favoring s...
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
:computer::warning: A curated collection of awesome malware, botnets, and other post-exploitation tools.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
Android-BackDoor is a python and shell script that simplifies the process of adding a backdoor to any Android APK file. It also exploits the Android Debug Bridge to remotely access an Android device.
This is An Offensive Hacking Tool which can be used by hackers and for penetration testing purposes. Hack Responsibly!!!!!!!
Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured systems.
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
A collection of hacking tools, resources and references to practice ethical hacking.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
An open-source post-exploitation framework for students, researchers and developers.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.
A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.
Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Directory environments
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.
Beacon Object File (BOF) launcher - library for executing BOF files in C/C++/Zig applications
A curated list of tools useful within the field of cyber security, for both blue and red team operations.
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.
SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)
Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.
A tool that allows you to search for vulnerable android devices across the world and exploit them.
Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio
A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educational use only.
Modular penetration testing platform that enables you to write, test, and execute exploit code.