abdulkadir-gungor / GhostLinks
"Ghost (RAT)" -> Reverse shell and management console for Windows
☆18Updated 3 years ago
Alternatives and similar repositories for Ghost
Users that are interested in Ghost are comparing it to the libraries listed below
Sorting:
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆49Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆35Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated 2 years ago
- PHP lab to test captcha bypassing☆30Updated 2 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 3 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆17Updated last year
- SMTP Open Relay Exploitation☆16Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated 2 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- A powerful reverse shell generator☆46Updated 3 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆36Updated 4 years ago
- VLAN attacks toolkit☆12Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Updated 3 years ago
- ☆14Updated 10 months ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago