atorrescogollo / offensive-tor-toolkit
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆60Updated 3 years ago
Alternatives and similar repositories for offensive-tor-toolkit:
Users that are interested in offensive-tor-toolkit are comparing it to the libraries listed below
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- A Golang implant that uses Slack as a command and control server☆46Updated 4 years ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆46Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆147Updated 3 years ago
- PowerShell payload generator☆116Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 3 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆198Updated 9 months ago
- Golang Implant & Post-Exploitation Framework☆59Updated last year
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- Koadic C3 COM Command & Control - JScript RAT☆43Updated 7 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated 4 months ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 9 months ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆75Updated 5 years ago
- Super organized and flexible script for sending phishing campaigns☆55Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Golang ransomware☆45Updated 4 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆146Updated 3 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 3 years ago
- Reverse shell using go☆38Updated 6 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Shellcode process injector☆27Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Multithread reverse shell listener☆24Updated last year
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Updated 2 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Updated 7 years ago