abdulkadir-gungor / GhostLinks
"Ghost (RAT)" -> Reverse shell and management console for Windows
☆18Updated 3 years ago
Alternatives and similar repositories for Ghost
Users that are interested in Ghost are comparing it to the libraries listed below
Sorting:
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- VLAN attacks toolkit☆12Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- Repository of tools used in my blog☆52Updated last year
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- An automated e-mail OSINT tool☆24Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 4 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆19Updated 3 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆46Updated 2 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- SMTP Open Relay Exploitation☆17Updated 4 years ago
- PHP lab to test captcha bypassing☆30Updated last year
- Funter (Forms Hunter) is a tool that hunts all forms and inputs found in a list of urls.☆18Updated 2 years ago
- Apache Tomcat Manager API WAR Shell Upload☆34Updated 5 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated last year