S12cybersecurity / GhostShell
Interactive shell to execute commands anonymously using Proxychains and Tor
☆40Updated 2 years ago
Alternatives and similar repositories for GhostShell:
Users that are interested in GhostShell are comparing it to the libraries listed below
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Ded Security Framework is a tool aimed at security professionals☆35Updated 11 months ago
- A Simple Script For SSH BruteForce☆36Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- Clipboard poisoning attack.☆56Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 11 months ago
- Hacking with PasteJacking technique☆22Updated 10 months ago
- Simple script to bulk check if IPs match networks☆12Updated 3 years ago
- Social Engineering Browser Update Attack.☆57Updated last year
- Powerful and smart Traffic Anonymizer using tor as a transparent proxy☆31Updated this week
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆41Updated last year
- Dogma V1.5.3☆29Updated 5 years ago
- GMS-Sploit GhostManSec - Hacking Tool - 8 method hacking - GhostManS3c-Sploit v1.2-dev☆21Updated last year
- ☆27Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆23Updated 3 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆41Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- Pentesting Tools to Automatize Active Directory Hacking☆20Updated 2 years ago
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logs☆37Updated 3 years ago
- DASH is deep osint Scanner. You just need username to start osint scan.☆48Updated 2 years ago
- Simple Python Modular Script to Broke Web Logins☆13Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 8 months ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆48Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆17Updated 2 years ago
- Information Gathering Simplified.☆65Updated 2 years ago
- xdebug 2.5.5 RCE exploit☆30Updated 3 months ago
- Proof of concept denial of service over TOR stress test tool☆41Updated 6 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- VLAN attacks toolkit☆14Updated 2 years ago