atorrescogollo / offensive-tor-toolkitLinks
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆61Updated 4 years ago
Alternatives and similar repositories for offensive-tor-toolkit
Users that are interested in offensive-tor-toolkit are comparing it to the libraries listed below
Sorting:
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated last year
- Meterpreter Reverse shell over TOR network using hidden services☆87Updated 4 years ago
- brute force SSH public-key authentication☆77Updated 7 months ago
- exfiltration/infiltration toolkit☆49Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
- Extract credentials and other useful info from network captures☆76Updated 3 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- Just basic scanner abusing CVE-2020-3452 to enumerate the standard files accessible in the Web Directory of the CISCO ASA applicances.☆24Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆66Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- A WLAN red team framework.☆155Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 4 years ago
- Want to crack passwords faster by using a wordlist that fits your 'target audience'? Use WikiRaider.☆45Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63Updated 2 years ago
- PowerShell payload generator☆119Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- A simple yet beautiful phishing proxy.☆59Updated 4 years ago
- Multithread reverse shell listener☆26Updated last year
- Some random tools I use for penetration testing☆89Updated 2 weeks ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- Koadic C3 COM Command & Control - JScript RAT☆49Updated 8 years ago
- Password list generator for password spraying - prebaked with goodies☆108Updated 2 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Updated 7 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago