0xdea / tactical-exploitation
Modern tactical exploitation toolkit.
☆847Updated 9 months ago
Alternatives and similar repositories for tactical-exploitation:
Users that are interested in tactical-exploitation are comparing it to the libraries listed below
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,278Updated 3 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 6 years ago
- ☆605Updated 7 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,061Updated 5 years ago
- HTA encryption tool for RedTeams☆1,394Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆612Updated 6 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆976Updated 7 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆748Updated 6 years ago
- Pop shells like a master.☆1,461Updated 6 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆521Updated 3 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,709Updated 6 months ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,607Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,733Updated 3 months ago
- kernel privilege escalation enumeration and exploitation framework☆690Updated 6 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆624Updated 3 months ago
- ☆515Updated last year
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- network reconnaissance toolkit☆423Updated 6 years ago
- Red Team Tool Kit☆1,119Updated 2 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆419Updated 8 months ago
- A collection of Red Team focused tools, scripts, and notes☆1,123Updated 5 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,309Updated 3 years ago
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- A Python Package for Data Exfiltration☆783Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆630Updated 3 years ago