atorrescogollo / offensive-tor-toolkit
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆61Updated 3 years ago
Alternatives and similar repositories for offensive-tor-toolkit
Users that are interested in offensive-tor-toolkit are comparing it to the libraries listed below
Sorting:
- Fast and intuitive manager for multiple reverse shells☆85Updated 5 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Updated 5 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- Router socks. One port socks for all the others.☆68Updated 11 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- Fast website scraper and wordlist generator☆77Updated last week
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆85Updated 2 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- Reverse shell using go☆38Updated 6 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 10 months ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated last month
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆60Updated 6 years ago
- masscan with exclusive excludes☆56Updated last year
- A golang library designed to interact with Metasploit☆43Updated 4 years ago