Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

Projects in Awesome Lists tagged with post-exploitation

A curated list of projects in awesome lists tagged with post-exploitation .

https://github.com/gtfobins/gtfobins.github.io

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

binaries bind-shell blueteam bypass exfiltration gtfobins linux post-exploitation redteam reverse-shell unix

Last synced: 29 Sep 2024

https://github.com/GTFOBins/GTFOBins.github.io

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

binaries bind-shell blueteam bypass exfiltration gtfobins linux post-exploitation redteam reverse-shell unix

Last synced: 30 Jul 2024

https://github.com/malwaredllc/byob

An open-source post-exploitation framework for students, researchers and developers.

antiforensics encrypted-connections no-dependencies platform-independent post-exploitation reverse-shells zero-configuration

Last synced: 30 Sep 2024

https://github.com/n1nj4sec/pupy

Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C

android backdoor linux mac-os meterpreter payload pentesting post-exploitation pupy python rat reflective-injection remote-access remote-admin-tool reverse-shell shell windows

Last synced: 25 Sep 2024

https://github.com/ne0nd0g/merlin

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

agent c2 command-and-control golang http2 post-exploitation

Last synced: 30 Sep 2024

https://github.com/Ne0nd0g/merlin

Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.

agent c2 command-and-control golang http2 post-exploitation

Last synced: 30 Jul 2024

https://github.com/huntergregal/mimipenguin

A tool to dump the login password from the current linux user

password-extraction post-exploitation

Last synced: 30 Sep 2024

https://github.com/funnywolf/viper

Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台

attack attack-surface-management cobalt-strike docker metasploit-framework post-exploitation red-team-tools redteam viper

Last synced: 30 Sep 2024

https://github.com/FunnyWolf/Viper

Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台

attack attack-surface-management cobalt-strike docker metasploit-framework post-exploitation red-team-tools redteam viper

Last synced: 31 Jul 2024

https://github.com/entysec/ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

adb android android-debug-bridge android-device android-exploit android-hack android-hacking android-rat backdoor entysec exploit exploitation-framework hack hacking hacking-tools kali-linux post-exploitation rat remote-access remote-shell

Last synced: 30 Sep 2024

https://github.com/EntySec/Ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

adb android android-debug-bridge android-device android-exploit android-hack android-hacking android-rat backdoor entysec exploit exploitation-framework hack hacking hacking-tools kali-linux post-exploitation rat remote-access remote-shell

Last synced: 01 Aug 2024

https://github.com/EntySec/ghost

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.

adb android android-debug-bridge android-device android-exploit android-hack android-hacking android-rat backdoor entysec exploit exploitation-framework hack hacking hacking-tools kali-linux post-exploitation rat remote-access remote-shell

Last synced: 30 Jul 2024

https://github.com/Marten4n6/EvilOSX

An evil RAT (Remote Administration Tool) for macOS / OS X.

backdoor mac macos macosx osx pentesting post-exploitation python python3 rat reverse-shell

Last synced: 31 Jul 2024

https://github.com/byt3bl33d3r/silenttrinity

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools

Last synced: 30 Sep 2024

https://github.com/byt3bl33d3r/SILENTTRINITY

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

boolang c-sharp dotnet dotnet-dlr dotnet-script ironpython post-exploitation python3 red-teams security-tools

Last synced: 31 Jul 2024

https://github.com/nicocha30/ligolo-ng

An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.

golang offensive-security pentest-tool pentesting pivoting post-exploitation redteam tunneling

Last synced: 26 Sep 2024

https://github.com/cyberark/kubesploit

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.

agent c2 command-and-control containers golang http2 kubernetes penetration-testing-framework penetration-testing-tools post-exploitation red-teams redteam-tools security security-tools

Last synced: 26 Sep 2024

https://github.com/megamansec/ssh-snake

SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.

bash cybersecurity exploitation exploitation-tool hacking hacking-tools pentesting post-exploitation redteam scanner security security-tools shell ssh ssh-hacking vulnerability-scanner worm

Last synced: 30 Sep 2024

https://github.com/MegaManSec/SSH-Snake

SSH-Snake is a self-propagating, self-replicating, file-less script that automates the post-exploitation task of SSH private key and host discovery.

bash cybersecurity exploitation exploitation-tool hacking hacking-tools pentesting post-exploitation redteam scanner security security-tools shell ssh ssh-hacking vulnerability-scanner worm

Last synced: 01 Aug 2024

https://github.com/ScRiPt1337/Teardroid-phprat

:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio

android-botnet android-exploitation android-malware android-pentesting android-rat bot botnet hacking hacking-tool keylogger post-exploitation rat

Last synced: 04 Aug 2024

https://github.com/brimstone/go-shellcode

Load shellcode into a new process

go post-exploitation redteam shellcode windows

Last synced: 01 Aug 2024

https://github.com/blackarrowsec/mssqlproxy

mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse

lateral-movement mssql post-exploitation proxy security-tool

Last synced: 28 Sep 2024

https://github.com/PaulNorman01/Forensia

Anti Forensics Tool For Red Teamers, Used For Erasing Footprints In The Post Exploitation Phase.

anti-forensics evasion forensics post-exploitation redteam

Last synced: 03 Aug 2024

https://github.com/redcode-labs/Bashark

Bash post exploitation toolkit

bash post-exploitation post-exploitation-toolkit

Last synced: 01 Aug 2024

https://github.com/adrianvollmer/powerhub

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

pentest post-exploitation powershell python remote-admin-tool

Last synced: 01 Aug 2024

https://github.com/AdrianVollmer/PowerHub

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

pentest post-exploitation powershell python remote-admin-tool

Last synced: 31 Jul 2024

https://github.com/screetsec/vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited

Last synced: 01 Aug 2024

https://github.com/screetsec/Vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited

Last synced: 06 Aug 2024

https://github.com/Screetsec/Vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

backdoor ghost indonesia infinite-scroll inject linux metasploit msfvenom post-exploitation postgresql rootkit unlimited

Last synced: 31 Jul 2024

https://github.com/b23r0/Heroinn

A cross platform C2/post-exploitation framework.

c2 pentest-tool post-exploitation rat remote-control trojan-rat

Last synced: 01 Aug 2024

https://github.com/emilyanncr/Windows-Post-Exploitation

Windows post-exploitation tools, resources, techniques and commands to use during post-exploitation phase of penetration test. Contributions are appreciated. Enjoy!

command-line ethical-hacking exploiting-windows hacking hacking-tool post-exploitation

Last synced: 01 Aug 2024

https://github.com/sevagas/swap_digger

swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.

dfir forensics hacking post-exploitation security

Last synced: 02 Aug 2024

https://github.com/zMarch/Orc

Orc is a post-exploitation framework for Linux written in Bash

bash post-exploitation

Last synced: 20 Aug 2024

https://github.com/zmarch/orc

Orc is a post-exploitation framework for Linux written in Bash

bash post-exploitation

Last synced: 01 Aug 2024

https://github.com/cyberark/Evasor

A tool to be used in post exploitation phase for blue and red teams to bypass APPLICATIONCONTROL policies

bypass-applocker-policies full-automated penetration-testing-tools post-exploitation

Last synced: 04 Aug 2024

https://github.com/panagiks/RSPET

RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario.

backdoor hacking pentesting plug-ins post-exploitation reverse-shell security security-audit udp-flood udp-spoof

Last synced: 04 Aug 2024

https://github.com/Ziconius/FudgeC2

FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.

c2 command-and-control cybersecurity implant offensive-security post-exploitation powershell purpleteam python3 readteaming redteam security security-tools

Last synced: 31 Jul 2024

https://github.com/vonahisec/leprechaun

This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.

post-exploitation privilege-escalation

Last synced: 01 Aug 2024

https://github.com/m8sec/enumdb

Relational database brute force and post exploitation tool for MySQL and MSSQL

brute-force database enumeration mssql mysql pentest-tool pentesting post-exploitation python3

Last synced: 28 Sep 2024

https://github.com/r00t-3xp10it/redpill

Assist reverse tcp shells in post-exploration tasks

c2-options cmdlet post-exploitation redteam reverse-tcp-shells

Last synced: 04 Aug 2024

https://github.com/0x09AL/DNS-Persist

DNS-Persist is a post-exploitation agent which uses DNS for command and control.

pentesting post-exploitation redteam

Last synced: 30 Jul 2024

https://github.com/Geeoon/DNS-Tunnel-Keylogger

Keylogging server and client that uses DNS tunneling/exfiltration to transmit keystrokes through firewalls.

cybersecurity dns dns-exfiltration dns-tunneling keylogger post-exploitation

Last synced: 26 Sep 2024

https://github.com/Gr1mmie/AtlasC2

C# C2 Framework centered around Stage 1 operations

command-and-control post-exploitation red-teaming stage-1

Last synced: 04 Aug 2024

https://github.com/r00t-3xp10it/msf-auxiliarys

My collection of metasploit auxiliary post-modules

metasploit msf-auxiliarys post-exploitation

Last synced: 03 Aug 2024

https://github.com/00xkhaled/Bella

Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. 🍎💻

data-mining macos pentesting post-exploitation remote-administrator-tool

Last synced: 03 Sep 2024

https://github.com/lexfo/rpc2socks

Post-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.

post-exploitation rpc smb socks windows

Last synced: 04 Aug 2024

https://github.com/blackbotsecurity/Atomic-Red-Team-Intelligence-C2

ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabilities via .NET's DLR.

csharp dotnet mitre-attack offensive-security post-exploitation powershell-scripts purple-team purpleteam python3 red-teams redteam

Last synced: 04 Aug 2024

https://github.com/go-outside-labs/sec-pentesting-toolkit

👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀

botnets cryptography ctf forensics gray-hacker-resources hacking infosec iocs linux malwares network penetration-testing pentesting post-exploitation reverse-engineering rubber-ducky steganography vulnerabilities wargame web-security

Last synced: 31 Jul 2024

https://github.com/mez-0/DecryptRDCManager

.NET 4.0 Remote Desktop Manager Password Gatherer

execute-assembly net-framework post-exploitation

Last synced: 04 Aug 2024

https://github.com/incredibleindishell/LDAP-credentials-collector-backdoor-generator

This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.

backdoorweb information-security ldap-exploitation post-exploitation

Last synced: 04 Aug 2024

https://github.com/ekiojp/dfex

DNS File EXfiltration

dns exfiltration file post-exploitation

Last synced: 04 Aug 2024

https://github.com/NullArray/SBD

Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.

bash bash-script post-exploitation shell shellscript

Last synced: 04 Aug 2024

https://github.com/powerexploit/Powerexploit

Post-Exploitation :sunglasses: module for Penetration Tester and Hackers.

pentesting post-exploitation powershell-module scanning vulnerability-assessment

Last synced: 04 Aug 2024

https://github.com/daymorelah/packetanalyzerandsniffer

A simple python module that implements a packet sniffer and analyser. It sniffs and analyses TCP, UDP, IPV4 and IPV6 traffic.

information-gathering penetration-testing post-exploitation

Last synced: 04 Aug 2024

https://github.com/crimsonlabs-io/Cache

An arms cache for security consultants, red teams and penetration testers. Sometimes for defenders too.

blue-team hacking penetration-test post-exploitation red-team security-consultants security-tools

Last synced: 04 Aug 2024

https://github.com/byt3n33dl3/c2kepexec

C2 : Command and Control Server for the Trojan Backdoor, acting as Remote access tool. Trojan Execution

backdoor c2 malware osx post-exploitation python3 rat reverse-shell shellcode shellexecute windows

Last synced: 01 Oct 2024

https://github.com/prvvv/chromeforensics

Different code samples for Chrome browser analysis & post exploitation

chrome chrome-devtools exploit forensic forensics forensics-tools hacking password post-exploitation

Last synced: 29 Sep 2024

https://github.com/marten4n6/evilosx

An evil RAT (Remote Administration Tool) for macOS / OS X.

backdoor mac macos macosx osx pentesting post-exploitation python python3 rat reverse-shell

Last synced: 30 Jul 2024