Ekultek / Graffiti
A tool to generate obfuscated one liners to aid in penetration testing
☆177Updated 6 years ago
Alternatives and similar repositories for Graffiti:
Users that are interested in Graffiti are comparing it to the libraries listed below
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆288Updated 3 months ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆284Updated 5 years ago
- Search Exploitable Software on Linux☆225Updated last year
- Office for Mac Macro Payload Generator☆239Updated 7 years ago
- ☆101Updated 6 years ago
- A WebSocket C2 Tool☆391Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆133Updated 5 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year
- Linux Privilege Escalation Tool☆182Updated 5 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- A payload stager using PowerShell☆183Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆200Updated last year
- Autoexploitation of some of the most common vulnerabilities in wild☆122Updated 6 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆339Updated 3 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆119Updated last year
- unix SSH post-exploitation 1337 tool☆136Updated 6 years ago
- Collection of social engineering payloads☆295Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- Port of eternal blue exploits to powershell☆150Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆294Updated 7 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆249Updated last year
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- mosquito - Automating reconnaissance and brute force attacks☆129Updated 5 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆313Updated 3 years ago
- Deploy payloads to *Nix systems en masse☆108Updated 4 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆134Updated 3 years ago