EgeBalci / ARCANUS
ARCANUS is a customized payload generator/handler.
☆142Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for ARCANUS
- Script to generate malicious debian packages (debain trojans).☆117Updated 5 years ago
- My collection of metasploit auxiliary post-modules☆189Updated 5 years ago
- The Inspector tool is a privilege escalation helper (PoC), easy to deployed on web server, this tool can list process running with root, …☆121Updated 6 years ago
- Yet another AV evasion tool☆119Updated 2 years ago
- Poison, reset, spoof, redirect MITM script☆124Updated last year
- An automated SMB relay exploitation script.☆151Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆117Updated last year
- Python library that facilitates interfacing with BeEF via it's RESTful API☆77Updated 7 years ago
- ☆125Updated 9 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆139Updated 9 years ago
- Port of eternal blue exploits to powershell☆149Updated 7 years ago
- Veil-Ordnance is a tool designed to quickly generate MSF stager shellcode☆73Updated 9 years ago
- A payload stager using PowerShell☆182Updated 4 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆59Updated 9 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆241Updated 10 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆146Updated 6 years ago
- Veil Catapult is no longer supported☆76Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆205Updated 6 years ago
- Tools that are related to pentest and network security☆96Updated 3 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆124Updated 7 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago