atorrescogollo / offensive-tor-toolkit
Bind/Reverse Shells, SOCKS, etc over Tor in Golang
☆55Updated 3 years ago
Related projects: ⓘ
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94Updated 3 years ago
- PowerShell payload generator☆111Updated 2 years ago
- cross-platform C2 framework in python 2☆40Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆109Updated 2 years ago
- A shell script that mimics sudo and sends you back the password☆42Updated last year
- Extract credentials and other useful info from network captures☆58Updated last year
- Koadic C3 COM Command & Control - JScript RAT☆42Updated 7 years ago
- A Golang implant that uses Slack as a command and control server☆45Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆91Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated last year
- ☆53Updated this week
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆24Updated 5 years ago
- Low to medium multithreaded Ubuntu Core honeypot coded in Python.☆76Updated 3 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆68Updated 3 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆50Updated 6 months ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆115Updated 2 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆145Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Create visualization from Shodan query☆70Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 2 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆84Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆93Updated last year
- Creates and sends fake meeting invite☆51Updated 3 years ago
- brute force SSH public-key authentication☆73Updated 5 months ago
- A WLAN red team framework.☆141Updated 7 months ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆115Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- An Encrypted File transfer via AES-256-CBC☆43Updated 3 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆72Updated 3 years ago
- Password list generator for password spraying - prebaked with goodies☆93Updated last year