atorrescogollo / offensive-tor-toolkitLinks
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆61Updated 4 years ago
Alternatives and similar repositories for offensive-tor-toolkit
Users that are interested in offensive-tor-toolkit are comparing it to the libraries listed below
Sorting:
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated last year
- brute force SSH public-key authentication☆77Updated 7 months ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- Extract credentials and other useful info from network captures☆75Updated 3 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆64Updated 2 years ago
- A WLAN red team framework.☆154Updated last year
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆97Updated 4 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 3 years ago
- Google Meet Phishing Template For Gophish☆47Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆112Updated 3 months ago
- PowerShell payload generator☆118Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- A tool for enumerating usernames from text, files, or websites☆82Updated 3 years ago
- Multithread reverse shell listener☆26Updated last year