0xdea / tactical-exploitation
Modern tactical exploitation toolkit.
☆841Updated 6 months ago
Alternatives and similar repositories for tactical-exploitation:
Users that are interested in tactical-exploitation are comparing it to the libraries listed below
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,248Updated 2 years ago
- HTA encryption tool for RedTeams☆1,375Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,206Updated 4 years ago
- A Python Package for Data Exfiltration☆770Updated 8 months ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆743Updated 6 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,049Updated 4 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆689Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆571Updated 7 months ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 3 years ago
- Tricks for penetration testing☆569Updated 4 years ago
- ☆601Updated 3 months ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆519Updated 3 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆616Updated last week
- Smart Install Exploitation Tool☆574Updated 3 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆635Updated last year
- A collection of Red Team focused tools, scripts, and notes☆1,115Updated 2 months ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,104Updated 7 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆783Updated last month
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,086Updated 4 years ago
- Scripts that are useful for me on pen tests☆527Updated 2 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆607Updated 6 years ago
- Malicious Macro Generator☆825Updated 5 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,598Updated last year
- Gets plaintext Active Directory credentials if you're on the internal network but outside the AD environment☆1,187Updated 6 years ago
- Pop shells like a master.☆1,449Updated 5 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆758Updated 4 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆505Updated 6 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆826Updated 7 years ago