hackerschoice / ssh-it
Self replicating and automatically spreading SSH worm that recovers login credentials
☆39Updated last year
Related projects: ⓘ
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 5 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 10 months ago
- Create a lnk shortcut file for Windows☆12Updated 5 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Man in the Browser Framework☆39Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆28Updated last year
- ☆42Updated this week
- ☆34Updated 4 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 10 months ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- A golang library designed to interact with Metasploit☆42Updated 3 years ago
- masscan with exclusive excludes☆55Updated 10 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆39Updated last year
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆28Updated 3 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆33Updated 2 months ago
- ☆12Updated 9 months ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆14Updated 2 years ago
- Polymorphic ELF Virus☆12Updated 2 years ago
- hiding in plain sight: part 2☆40Updated 2 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated last year
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆16Updated 2 weeks ago
- ECC Public Key Cryptography☆33Updated 10 months ago
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆28Updated 10 months ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆30Updated 3 years ago