atorrescogollo / offensive-tor-toolkitLinks
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆62Updated 4 years ago
Alternatives and similar repositories for offensive-tor-toolkit
Users that are interested in offensive-tor-toolkit are comparing it to the libraries listed below
Sorting:
- brute force SSH public-key authentication☆77Updated last month
- Fast and intuitive manager for multiple reverse shells☆85Updated 7 months ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆149Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- PowerShell payload generator☆117Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 2 years ago
- A WLAN red team framework.☆156Updated 9 months ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- my goto docker image when playing ctfs with all the tools I need☆16Updated 3 weeks ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆42Updated 4 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 4 years ago
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆59Updated 2 years ago
- exfiltration/infiltration toolkit☆45Updated 8 months ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Golang Implant & Post-Exploitation Framework☆59Updated 2 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- ☆78Updated 4 years ago
- easy-to-use payload hosting☆270Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆108Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- ☆54Updated 6 years ago
- A proof-of-concept reverse-shell written in rust.☆33Updated 6 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago