atorrescogollo / offensive-tor-toolkitLinks
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆63Updated 4 years ago
Alternatives and similar repositories for offensive-tor-toolkit
Users that are interested in offensive-tor-toolkit are comparing it to the libraries listed below
Sorting:
- Fast and intuitive manager for multiple reverse shells☆86Updated 11 months ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆74Updated 4 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- PowerShell payload generator☆118Updated 4 years ago
- Multithread reverse shell listener☆26Updated last year
- brute force SSH public-key authentication☆79Updated 5 months ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 3 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 4 years ago
- Collection of extra pentest tools for Kali Linux☆110Updated 2 months ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆25Updated 7 years ago
- Extract credentials and other useful info from network captures☆73Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- A WLAN red team framework.☆155Updated last year
- Some random tools I use for penetration testing☆89Updated 7 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆122Updated 5 years ago
- Koadic C3 COM Command & Control - JScript RAT☆44Updated 8 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Updated 3 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Golang ransomware☆47Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 3 years ago
- Simple & Customizable DNS Data Exfiltrator☆112Updated 2 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆84Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago