Golang tool designed to exfiltrate passwords found via the sshd and su services
☆28Nov 23, 2025Updated 5 months ago
Alternatives and similar repositories for Hawk
Users that are interested in Hawk are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Simple PoC☆22May 24, 2024Updated last year
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 4 years ago
- string encryption in Nim☆19Jun 15, 2024Updated last year
- A C project that generates usernames based on input lists and format you decide yourself☆11Jan 23, 2025Updated last year
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Swiss army knife for payload encryption and obfuscation☆28Jan 22, 2024Updated 2 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- MYSQL plugin that allows RCE through a query☆10Mar 21, 2019Updated 7 years ago
- Awesome MalDev Links☆58Mar 18, 2026Updated last month
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 5 years ago
- Powershell and python utilties for Entra Connect☆29Jun 5, 2025Updated 10 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆37Feb 11, 2023Updated 3 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- Repo of RIT CCDC Team Scripts☆14Mar 28, 2022Updated 4 years ago
- AV/EDR companies netblocks☆18Nov 9, 2021Updated 4 years ago
- shellcode transformation tool for YARA evasion☆61Dec 17, 2025Updated 4 months ago
- ☆16Jan 9, 2025Updated last year
- Red Team Collaboration Infrastructure☆97Apr 24, 2025Updated last year
- Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.☆617Updated this week
- kunkillable is an LKM that makes userland processes unkillable.☆17Sep 26, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- NoirGate provides on-demand ephemeral anonymous shells secured by TOTP☆34Apr 29, 2024Updated 2 years ago
- 👾 A command-line tool to easily run a man-in-the-middle attack leveraging ARP cache poisoning.☆13Sep 15, 2024Updated last year
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- eBPF hacks☆197Dec 12, 2024Updated last year
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- 🖼 imgify - Convert any file to PNG and back.☆14Oct 20, 2025Updated 6 months ago
- ☆34Mar 7, 2020Updated 6 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- nysm is a stealth post-exploitation container.☆267Jun 19, 2025Updated 10 months ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Toolchains for cross compilation and cross testing for Rust.☆22Jan 30, 2026Updated 2 months ago
- This is a proof-of-work for abusing "fsmonitor" against IDE.☆44Nov 22, 2025Updated 5 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- Competition Infrastructure Management☆89Nov 17, 2021Updated 4 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago