ariary / tacos
๐ฎ INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)
โ29Updated last year
Alternatives and similar repositories for tacos:
Users that are interested in tacos are comparing it to the libraries listed below
- Configurable, Community driven, HTTP C2 Profileโ17Updated 2 weeks ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeโฆโ19Updated 2 years ago
- A little implant which SSH's back with a shellโ36Updated 3 years ago
- Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960โ2Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps โฆโ24Updated 2 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhilโ21Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.โ26Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Managementโ15Updated 2 years ago
- Fast and lightweight Web Application Firewall Fingerprinting toolโ62Updated 3 months ago
- Cisco CallManager User Enumerationโ15Updated 2 years ago
- Simple Python script to sort nuclei scans by severity and URLโ29Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.โ33Updated last month
- ShootCutMe an .LNK file creator tool for redteamerโ13Updated 6 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.โ15Updated 8 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaksโ26Updated last year
- Searching .evtx logs for remote connectionsโ23Updated last year
- Tomcat backdoor based on CS blogโ27Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.โ24Updated 3 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)โ22Updated 3 years ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.โ31Updated 9 months ago
- Some Cyber Security related scriptsโ18Updated last year
- Analyzing AD domains for security risks related to user accountsโ63Updated 2 years ago
- Enumerate AWS cloud resources based on provided credentialโ50Updated 2 years ago
- Right-To-Left Override POCโ34Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.โ49Updated 2 months ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.โ29Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.โ40Updated 2 years ago
- Take domains on stdin and output them on stdout if they get resolvedโ33Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.โ42Updated 2 years ago
- Tool to start processes as SYSTEM using token duplicationโ38Updated 4 years ago