atorrescogollo / offensive-tor-toolkit
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆60Updated 3 years ago
Alternatives and similar repositories for offensive-tor-toolkit:
Users that are interested in offensive-tor-toolkit are comparing it to the libraries listed below
- Self replicating and automatically spreading SSH worm that recovers login credentials☆51Updated last year
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆112Updated 2 years ago
- Router socks. One port socks for all the others.☆67Updated 10 months ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆66Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆59Updated 6 years ago
- ☆19Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- A WLAN red team framework.☆151Updated 5 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆111Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆128Updated 4 months ago
- polymorphic webshells☆30Updated 7 years ago
- A python3 and bash PoC for CVE-2021-4034 by Kim Schulz☆21Updated 3 years ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆62Updated 3 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 4 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Modular rootkit framework.☆27Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆75Updated 5 years ago
- Extract credentials and other useful info from network captures☆68Updated 2 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- PowerShell payload generator☆115Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- A web shell for pivoting and lateral movement☆33Updated 7 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 8 months ago