abdulkadir-gungor / GhostLinks
"Ghost (RAT)" -> Reverse shell and management console for Windows
☆18Updated 3 years ago
Alternatives and similar repositories for Ghost
Users that are interested in Ghost are comparing it to the libraries listed below
Sorting:
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 3 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- SMTP Open Relay Exploitation☆17Updated 5 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Repository of tools used in my blog☆52Updated last year
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- A powerful reverse shell generator☆45Updated 3 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated last month
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated 2 years ago
- ☆13Updated 8 months ago
- PHP lab to test captcha bypassing☆30Updated last year
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated 9 months ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- Apache Tomcat Manager API WAR Shell Upload☆34Updated 5 years ago
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- web application pentesting tools for docker☆18Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Anubis 7.0☆27Updated last year