krishpranav / exploit-frameworkLinks
A multiple reverse shell sessions/clients manager via terminal written in go
β14Updated 4 years ago
Alternatives and similar repositories for exploit-framework
Users that are interested in exploit-framework are comparing it to the libraries listed below
Sorting:
- π Reverse shell written on python3β14Updated 5 years ago
- π Help find Trojan Source vulnerability in code π . Useful for code review in project with multiple collaborators (CI/CD)β47Updated 2 years ago
- Passwordless RDP Session Hijackingβ70Updated 4 years ago
- Windows offline filesystem hacking tool for Linuxβ96Updated 3 years ago
- Lateralus is terminal based phishing campaign toolβ27Updated 2 years ago
- Collection of reverse shellsβ56Updated 5 years ago
- GoRAT (Go Remote Access Tool) is an extremely powerful reverse shell, file server, and control plane using HTTPS reverse tunnels as a traβ¦β73Updated 4 years ago
- Jok3r - Network and Web Pentest Frameworkβ17Updated 6 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness relatedβ¦β18Updated 3 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.β35Updated last year
- Working exploit code for CVE-2019-17625β19Updated 5 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.β98Updated 4 months ago
- Secretly record audio and video with chromium based browsers.β23Updated last year
- Bypass Windows Defender with py2exe from memory.β39Updated 3 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.β12Updated 5 years ago
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerabilityβ27Updated 5 years ago
- Router socks. One port socks for all the others.β69Updated last year
- The best way to send emails in Go.β12Updated 5 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.β68Updated 6 years ago
- cross-platform C2 framework in python 2β38Updated 3 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the taβ¦β13Updated 2 years ago
- Red Team C2 and Post Exploitation codeβ34Updated 6 months ago
- An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.β12Updated 5 years ago
- Apache Tomcat Manager API WAR Shell Uploadβ35Updated 5 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.β49Updated 5 years ago
- Transform your batch (bat) script into one binary.exeβ52Updated last year
- A collection of weaponized LPE exploits written in Goβ53Updated last year
- Linux x86_64 Process Injection Utilityβ58Updated 4 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ28Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β21Updated 3 years ago