kavishkagihan / Cannon
Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined modules, harvest reverse shells, and many more.
☆19Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for Cannon
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 2 weeks ago
- Bash script to generate reverse shell payloads☆20Updated last year
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆53Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆27Updated 2 years ago
- Simple recon tool automates your recon process☆16Updated last year
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 2 years ago
- ☆46Updated 2 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆51Updated 9 months ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 8 months ago
- ☆17Updated 2 years ago
- A python approach to interacting with web shells.☆29Updated 3 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 2 years ago
- ☆21Updated last year
- Open-Source Phishing Toolkit☆17Updated 3 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.☆29Updated 3 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆48Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- ☆20Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆50Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆61Updated 2 years ago