Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin
☆17Apr 23, 2020Updated 5 years ago
Alternatives and similar repositories for AgentSmith
Users that are interested in AgentSmith are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Oct 10, 2020Updated 5 years ago
- A pentesting Firefox spy extension - PoC☆10Jun 16, 2016Updated 9 years ago
- Modular C2 server to tame your pack of wolves☆22Mar 14, 2026Updated last week
- Ant is a post-exploitation tool designed to automate the deployment of tunnels and port forwarding based on a predefined topology configu…☆17Jan 31, 2024Updated 2 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- ☆13Jan 3, 2021Updated 5 years ago
- A Simple RedLineStealer☆13Aug 30, 2023Updated 2 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Collection of Rust repos useful for Red Teamers.☆34Sep 23, 2022Updated 3 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Windows IKEEXT DLL Hijacking Exploit Tool☆35Feb 25, 2018Updated 8 years ago
- DLL hijack codes for cmake on windows.☆25Jun 26, 2023Updated 2 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- RatChatPT☆16Jun 9, 2023Updated 2 years ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- A list of OSINT resources and tools that may be useful when conducting investigations related to the Kingdom of Saudi Arabia☆12May 12, 2025Updated 10 months ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 6 years ago
- Red Team Projects with chat.openai.com.☆17Apr 3, 2023Updated 2 years ago
- IPSec testing tool☆19Oct 19, 2024Updated last year
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Digital Artefact Extraction Tool for Discord Application☆12Apr 13, 2023Updated 2 years ago
- AI-based implant feature☆25Apr 28, 2025Updated 10 months ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.☆102Jan 7, 2022Updated 4 years ago
- Social Engineering Attack Using Phishing in a Local Area Wi-Fi by Creating an Access Point and DNS Manipulation☆13Nov 25, 2021Updated 4 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Password list generator for password spraying - prebaked with goodies☆109Feb 21, 2023Updated 3 years ago
- This is the AV ("protection solution") used for my windows 10 rootkit main project. this includes the installer stager program, a service…☆13May 2, 2024Updated last year
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- C# remote process injection utility for Cobalt Strike☆88Mar 9, 2020Updated 6 years ago
- ☆23Jun 9, 2024Updated last year
- ☆12Jun 4, 2025Updated 9 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago