hc0d3r / tea
ssh-client worm
☆155Updated 5 years ago
Alternatives and similar repositories for tea:
Users that are interested in tea are comparing it to the libraries listed below
- Extensible Red Team Framework☆111Updated 5 years ago
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Public work for CVE-2019-0708☆290Updated 5 years ago
- APT34/OILRIG leak☆231Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆251Updated last year
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆340Updated 3 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆315Updated 3 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆119Updated last year
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆94Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆385Updated 6 years ago
- Fuzzbunch deployment for Debian - Intructions: Readme.md☆136Updated 3 years ago
- OFFICE DDEAUTO Payload Generation script☆127Updated 4 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- A simple embedded Linux backdoor.☆197Updated 4 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆245Updated last year
- Explore the network using VPNPivot tool☆269Updated 8 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆149Updated 6 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- A payload stager using PowerShell☆183Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆130Updated 5 years ago
- Windows active user credential phishing tool☆280Updated 5 years ago
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆247Updated 3 years ago
- MS17-010☆63Updated 7 years ago