MSFvenom Payload Creator (MSFPC)
☆1,318May 9, 2021Updated 4 years ago
Alternatives and similar repositories for msfpc
Users that are interested in msfpc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,906Jan 24, 2024Updated 2 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆317Apr 27, 2020Updated 5 years ago
- venom - C2 shellcode generator/compiler/handler☆1,943Dec 9, 2023Updated 2 years ago
- Undetectable Windows Payload Generation☆1,609Nov 8, 2022Updated 3 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,098Mar 17, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,995Oct 10, 2018Updated 7 years ago
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,188Dec 11, 2022Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,454Nov 3, 2018Updated 7 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆4,179May 11, 2023Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,828Jan 19, 2020Updated 6 years ago
- A swiss army knife for pentesting networks☆9,108Dec 6, 2023Updated 2 years ago
- Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C☆8,954Mar 22, 2024Updated 2 years ago
- Python antivirus evasion tool☆1,451Oct 21, 2023Updated 2 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Personal Collection of Operating Systems Scripts☆572May 16, 2024Updated last year
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,499Aug 1, 2023Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,214Sep 14, 2020Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- Powershell C2 Server and Implants☆576Nov 11, 2019Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,217Oct 9, 2023Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- Find exploits in local and online databases instantly☆1,812Sep 27, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- NetRipper - Smart traffic sniffing for penetration testers☆1,388Jun 17, 2022Updated 3 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆574Dec 9, 2017Updated 8 years ago
- Post Exploitation Collection☆1,572May 1, 2020Updated 5 years ago
- A post-exploitation powershell tool for extracting juicy info from memory.☆1,865Jun 28, 2024Updated last year
- SMBMap is a handy SMB enumeration tool☆2,025Jan 6, 2026Updated 2 months ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,805Apr 25, 2024Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool☆5,687Updated this week
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,624Jan 23, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,499Sep 22, 2024Updated last year
- Homemade scripts to-do various vulnerable challenges☆79Jan 7, 2021Updated 5 years ago
- RottenPotato local privilege escalation from service account to SYSTEM☆692Dec 29, 2017Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,109Nov 3, 2017Updated 8 years ago
- Network Infrastructure Penetration Testing Tool☆1,669Jun 2, 2021Updated 4 years ago