Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
☆1,228Oct 1, 2022Updated 3 years ago
Alternatives and similar repositories for Kage
Users that are interested in Kage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python antivirus evasion tool☆1,451Oct 21, 2023Updated 2 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,098Mar 17, 2024Updated 2 years ago
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,649Jul 18, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Credentials gathering tool automating remote procdump and parse of lsass process.☆783Jun 20, 2020Updated 5 years ago
- Android Remote Administration Tool☆5,096Aug 12, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,448May 6, 2024Updated last year
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,052Nov 4, 2024Updated last year
- Starkiller is a Frontend for PowerShell Empire.☆1,643Mar 3, 2026Updated 3 weeks ago
- Antivirus evasion project☆1,154Jan 19, 2025Updated last year
- A Modern Orchestration Engine for Security☆6,155Mar 13, 2026Updated 2 weeks ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆5,092Feb 25, 2026Updated last month
- Red Team Tool Kit☆1,133Dec 8, 2022Updated 3 years ago
- Attack Surface Management Platform☆9,622Feb 15, 2026Updated last month
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,546Oct 16, 2025Updated 5 months ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,954Mar 22, 2024Updated 2 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,217Oct 9, 2023Updated 2 years ago
- The all-in-one browser extension for offensive security professionals 🛠☆6,663Jan 5, 2025Updated last year
- Self-deployable file hosting service for red teamers, allowing to easily upload and share payloads over HTTP and WebDAV.☆2,243Feb 25, 2023Updated 3 years ago
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,906Jan 24, 2024Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 8 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- The Havoc Framework☆8,256Dec 18, 2025Updated 3 months ago
- Windows Exploit Suggester - Next Generation☆4,789Mar 13, 2026Updated 2 weeks ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆751Sep 1, 2022Updated 3 years ago
- EasySploit - Metasploit automation (EASIER and FASTER than EVER)☆380Jan 29, 2020Updated 6 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆505Mar 11, 2024Updated 2 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,765Dec 9, 2025Updated 3 months ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,179Oct 20, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,095Nov 20, 2025Updated 4 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- CobaltStrike后渗透测试插件☆1,557Oct 28, 2021Updated 4 years ago
- A collaborative, multi-platform, red teaming framework☆4,372Updated this week
- Remote Administration Tool for Windows☆9,762Feb 29, 2024Updated 2 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,299Aug 15, 2024Updated last year