CalfCrusher / PoianaLinks
Meterpreter Reverse shell over TOR network using hidden services
☆87Updated 4 years ago
Alternatives and similar repositories for Poiana
Users that are interested in Poiana are comparing it to the libraries listed below
Sorting:
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Updated 4 years ago
- A WLAN red team framework.☆155Updated last year
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆61Updated 4 years ago
- Linux Persistence Toolkit☆73Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated 9 months ago
- Automatic reverse/bind shell generator cheat sheet.☆34Updated 3 years ago
- My Password Cracking Methodology☆83Updated 2 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 3 years ago
- Lite version of my Gatekeeper backdoor for public use.☆53Updated 4 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- A powerful and delightful PHP WebShell☆66Updated 11 months ago
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- Generate common Reverse Shells for Pentesting☆43Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆104Updated 4 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆112Updated 9 months ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆133Updated this week
- Open-Source Collection of Social Engineering Pretexts☆142Updated 2 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated last year
- PowerShell payload generator☆119Updated 4 years ago
- Password list generator for password spraying - prebaked with goodies☆108Updated 2 years ago
- https://github.com/BC-SECURITY/Empire☆50Updated 3 years ago
- This project is aimed at freely providing technical guides on various hacking tools.☆117Updated last year