WangYihang / PlatypusLinks
A modern multiple reverse shell sessions manager written in go
☆1,632Updated this week
Alternatives and similar repositories for Platypus
Users that are interested in Platypus are comparing it to the libraries listed below
Sorting:
- Linux/Windows post-exploitation framework made by linux user☆1,649Updated this week
- Venom - A Multi-hop Proxy for Penetration Testers☆2,135Updated 3 years ago
- generate CobaltStrike's cross-platform payload☆2,521Updated 2 years ago
- 👻Stowaway -- Multi-hop Proxy Tool for pentesters☆3,262Updated 8 months ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,456Updated 10 months ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,253Updated 5 years ago
- Redis(<=5.0.5) RCE☆1,116Updated 2 years ago
- 👻Impost3r -- A linux password thief☆654Updated 9 months ago
- Neo-reGeorg is a project that seeks to aggressively refactor reGeorg☆3,276Updated 3 months ago
- Sudo Baron Samedit Exploit☆784Updated 3 years ago
- Pwn stuff.☆1,806Updated 3 years ago
- 记录自己编写、修改的部分工具☆1,458Updated last month
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,548Updated last year
- ☆1,372Updated 5 years ago
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,741Updated 2 years ago
- The great impacket example scripts compiled for Windows☆993Updated 6 years ago
- Bypass firewall for traffic forwarding using webshell☆1,426Updated 4 years ago
- weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-201…☆2,065Updated 2 years ago
- Load shellcode into a new process☆771Updated 4 years ago
- AV Evasion Tool For Red Team Ops☆769Updated 4 years ago
- A collection of pentest and development tips☆1,125Updated 3 years ago
- Redis 4.x/5.x RCE☆975Updated 4 years ago
- Dirty Cow exploit - CVE-2016-5195☆909Updated 4 months ago
- Windows 权限提升 BadPotato☆873Updated 5 years ago
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,150Updated 2 years ago
- Fake Protocol Server☆1,606Updated 11 months ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,182Updated 2 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆929Updated 5 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆3,142Updated 9 months ago
- Simple reverse ICMP shell☆1,612Updated 7 years ago