Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.
☆19Jul 14, 2022Updated 3 years ago
Alternatives and similar repositories for Venom
Users that are interested in Venom are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- 修改自官方yara工具☆14May 6, 2024Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- CVE-2021-43798 Grafana 任意文件读取漏洞 POC+参数☆14Dec 17, 2021Updated 4 years ago
- Windows Antivirus Evasion and Memory Injection☆12Feb 19, 2022Updated 4 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- 参考国外巨佬思路,自己写一个为渗透测试初始化ubuntu虚拟机的bash脚本☆16Oct 13, 2025Updated 5 months ago
- shiro反序列化利用综合利用,包含(回显执行命令/注入内存 马)原版中NoCC的问题 https://github.com/j1anFen/shiro_attack☆12May 1, 2022Updated 3 years ago
- GAS 漏洞利用框架☆27Mar 25, 2022Updated 4 years ago
- HACKING BOT is an automated bug bounty tool that streamlines security testing by running multiple cybersecurity tools in parallel. It all…☆18Mar 6, 2025Updated last year
- Confluence Hardcoded Password POC☆15Jul 30, 2022Updated 3 years ago
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- CVE-2022-22947_POC_EXP☆13Mar 17, 2022Updated 4 years ago
- ☆20Feb 27, 2022Updated 4 years ago
- 改造一个基于jrmp的AMF反序列化利用工具☆16Jul 7, 2022Updated 3 years ago
- 从零开始的内网渗透学习记录☆12Mar 25, 2022Updated 3 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- ☆10Jun 15, 2024Updated last year
- 渗透测试、攻防姿势笔记☆20Jun 13, 2025Updated 9 months ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆19Jan 28, 2022Updated 4 years ago
- 异或shellcode和ppid欺骗免杀☆14Mar 8, 2022Updated 4 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Oct 12, 2022Updated 3 years ago
- Worm is an Android post exploitation Framework to gain remote access of any Android device by exploiting Android Debug Bridge.☆14Jun 7, 2024Updated last year
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 9 months ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- 红队笔记☆18Jul 20, 2022Updated 3 years ago
- 一个2020年练手的基于gin框架搞的在线免杀平台,支持后台管理,邀请码注册等☆39Sep 12, 2024Updated last year
- A python script to acquire multiple aws ec2 instances in a forensically sound-ish way☆38Nov 8, 2021Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆41Apr 9, 2022Updated 3 years ago
- Virus Maker by Black Host☆15Apr 10, 2020Updated 5 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- JavaAgent内存马实现、检测、修复demo☆11Dec 7, 2022Updated 3 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- bypass AV☆18Jun 4, 2021Updated 4 years ago
- 一款综合漏洞利用工具箱。☆51Jun 15, 2022Updated 3 years ago
- Convert batch script to executable with advanced obfuscator. Based on Batch-Obfuscator bat2exe very advanced and very well made.☆14Jan 5, 2022Updated 4 years ago
- Handy batch scripts (Malicous and not malicous)☆16May 3, 2020Updated 5 years ago