EONRaider / BCA-PhantomLinks
A multi-platform HTTP(S) Reverse Shell Server and Client in Python 3
☆101Updated 2 years ago
Alternatives and similar repositories for BCA-Phantom
Users that are interested in BCA-Phantom are comparing it to the libraries listed below
Sorting:
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 3 years ago
- A WLAN red team framework.☆157Updated 10 months ago
- Yet another content discovery tool☆119Updated 8 months ago
- PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call.☆192Updated 11 months ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- Python resource library for creating security related tooling☆79Updated last year
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Updated last year
- Enhance your malware detection with WAF + YARA (WAFARAY)☆109Updated 2 years ago
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- arbitrary TCP and UDP connections and listens (Netcat for Python).☆101Updated 9 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆96Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 years ago
- ☆104Updated 2 years ago
- Faraday's Command Line Interface☆50Updated this week
- Vimana is an experimental security framework that aims to provide resources for auditing Python web applications.☆64Updated 2 weeks ago
- Simple CLI script to check if you have a password that has been compromised in a data breach.☆55Updated last month
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆200Updated 4 months ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Bug's feed is a local hosted portal where you can search for the latest news, videos, CVEs, vulnerabilities...☆96Updated 2 years ago
- Scrape Pastebin API to collect daily pastes, setup a wordlist and be alerted by email when you have a match.☆49Updated 6 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago