Simulates a logged in user.
☆16Jul 10, 2024Updated last year
Alternatives and similar repositories for ghostshell
Users that are interested in ghostshell are comparing it to the libraries listed below
Sorting:
- ☆13Oct 12, 2017Updated 8 years ago
- libssh CVE-2018-10933☆21Oct 20, 2018Updated 7 years ago
- This repo contains Axis web shells☆18Jun 15, 2019Updated 6 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Nov 23, 2024Updated last year
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- PHPEB is a small tool that generates and stores obfuscated shellcode in user specified EXIF handlers.☆80Apr 17, 2017Updated 8 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Docker image for SQLiScanner☆15Jul 26, 2017Updated 8 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- clone from http://ujeni.murkyroc.com/hmap/☆18Mar 25, 2020Updated 5 years ago
- Proof of concept for vulnerability management of Docker containers☆16May 4, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- This program implements port knocking for access to Windows via RDP / TS☆15Apr 5, 2021Updated 4 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- PoC for CVE-2019-10207☆20Mar 27, 2022Updated 3 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Cyberdelia, a Collection of Command and Control frameworks☆64Oct 16, 2019Updated 6 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- Metasploit reverse TCP stager fully undetectable☆18Nov 29, 2015Updated 10 years ago
- 稳定多线程中的inline hook☆16Jun 19, 2019Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- simple shellcode loader for linux & win, x86 & x64☆34Nov 5, 2016Updated 9 years ago
- Vulnerable rails application that is configurable in its vulnerability☆20Jun 4, 2018Updated 7 years ago
- Python script to extract and bruteforce OpenNMS password hashes in users.xml☆18Jun 21, 2017Updated 8 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago