Psmths / reave
WIP Post-exploitation framework tailored for hypervisors.
☆50Updated last year
Alternatives and similar repositories for reave:
Users that are interested in reave are comparing it to the libraries listed below
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆39Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 3 years ago
- lightweight http redirector written in nim☆11Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated last year
- powershell tool for VM evasion☆43Updated 4 years ago
- ☆12Updated 2 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆16Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Updated 3 years ago
- wpscvn is a tool for pentesters, website owner to test if their websites had some vulnerable plugins or themes☆15Updated 6 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- ☆24Updated last year
- Basic Dart reverse shell code☆21Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- TCP Data Transfer Tool By ClumsyLulz☆12Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 6 months ago
- Rust Weaponization for Red Team Engagements.☆11Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆38Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated last year