krishpranav / exploit-frameworkLinks
A multiple reverse shell sessions/clients manager via terminal written in go
โ15Updated 4 years ago
Alternatives and similar repositories for exploit-framework
Users that are interested in exploit-framework are comparing it to the libraries listed below
Sorting:
- ๐ Help find Trojan Source vulnerability in code ๐ . Useful for code review in project with multiple collaborators (CI/CD)โ48Updated last year
- Lateralus is terminal based phishing campaign toolโ27Updated 2 years ago
- ๐ Reverse shell written on python3โ15Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeโฆโ20Updated 3 years ago
- The best way to send emails in Go.โ10Updated 4 years ago
- Recon-ng modules for basic OSINT.โ11Updated 3 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentialsโ52Updated 2 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.โ35Updated 8 months ago
- โ25Updated 3 years ago
- ๐ฎ INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)โ30Updated last year
- MSFVenom Powershell Stager Encoder & Generatorโ16Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.โ69Updated 5 years ago
- Red Team C2 and Post Exploitation codeโ37Updated last month
- Shellcode process injectorโ28Updated 5 years ago
- Windows offline filesystem hacking tool for Linuxโ97Updated 3 years ago
- HTTP based framework for building command and control components for remote access trojansโ15Updated 4 years ago
- Phishing Reverse Proxy with MFA bypassโ17Updated 2 years ago
- recover Firefox and more browsers loginsโ50Updated 3 years ago
- This is the ToRat client, a part of the ToRat Project.โ26Updated 5 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.โ105Updated 5 years ago
- Transform your batch (bat) script into one binary.exeโ52Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pโฆโ34Updated 6 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps โฆโ24Updated 3 years ago
- PAM Backdoorโ30Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.โ36Updated 3 years ago
- Modular C2 server to tame your pack of wolvesโ19Updated last week
- Hybrid memory/disk mapโ58Updated last week
- A collection of weaponized LPE exploits written in Goโ53Updated 7 months ago
- Cross platform system wide proxy server & TLS Interception library for Pythonโ22Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sysโฆโ18Updated 2 weeks ago