krishpranav / exploit-frameworkLinks
A multiple reverse shell sessions/clients manager via terminal written in go
โ15Updated 4 years ago
Alternatives and similar repositories for exploit-framework
Users that are interested in exploit-framework are comparing it to the libraries listed below
Sorting:
- โ25Updated 3 years ago
- ๐ Reverse shell written on python3โ14Updated 4 years ago
- ๐ Help find Trojan Source vulnerability in code ๐ . Useful for code review in project with multiple collaborators (CI/CD)โ47Updated last year
- The best way to send emails in Go.โ10Updated 4 years ago
- ๐ฎ INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)โ30Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.โ68Updated 5 years ago
- Lateralus is terminal based phishing campaign toolโ27Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeโฆโ20Updated 3 years ago
- Recon-ng modules for basic OSINT.โ11Updated 3 years ago
- A collection of weaponized LPE exploits written in Goโ53Updated 8 months ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logicโ67Updated last year
- Router socks. One port socks for all the others.โ69Updated last year
- Red Team Stuffsโ19Updated 3 years ago
- Tiny embeddable dns serverโ52Updated last week
- Red Team C2 and Post Exploitation codeโ36Updated 2 months ago
- Self replicating and automatically spreading SSH worm that recovers login credentialsโ54Updated 2 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness relatedโฆโ18Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.โ35Updated 9 months ago
- Windows offline filesystem hacking tool for Linuxโ96Updated 3 years ago
- Tool to bruteforce Windows LDAP, Kerberos, RDP, SSH, FTP, HTTP basic and digest authenticationโ25Updated 9 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &โฆโ40Updated 3 years ago
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives uโฆโ10Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.โ36Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps โฆโ24Updated 3 years ago
- Secretly record audio and video with chromium based browsers.โ22Updated last year
- Collection of reverse shellsโ56Updated 4 years ago
- HTTP based framework for building command and control components for remote access trojansโ15Updated 4 years ago
- Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Goโ18Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can lโฆโ17Updated 4 years ago
- x86_64 LKM linux rootkitโ16Updated 2 years ago