Ekultek / Graffiti
A tool to generate obfuscated one liners to aid in penetration testing
☆177Updated 5 years ago
Alternatives and similar repositories for Graffiti:
Users that are interested in Graffiti are comparing it to the libraries listed below
- PowerShell Empire mod to post-exploit the World!☆136Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Tool to deploy a post-exploitation prompt at any time☆310Updated 3 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆439Updated last year
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆338Updated 3 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆286Updated 2 months ago
- Common password pattern generator using strings list☆131Updated 4 years ago
- Linux Privilege Escalation Tool☆181Updated 5 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆206Updated 7 years ago
- unix SSH post-exploitation 1337 tool☆134Updated 6 years ago
- Using IPv6 to Bypass Security☆94Updated last year
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- ☆100Updated 6 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆311Updated 3 years ago
- Office for Mac Macro Payload Generator☆235Updated 7 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆245Updated last year
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- mosquito - Automating reconnaissance and brute force attacks☆128Updated 5 years ago
- Automate Metasploit scanning and exploitation☆113Updated 3 months ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆326Updated 5 months ago