A command-line network packet crafting and injection utility
☆521Sep 29, 2023Updated 2 years ago
Alternatives and similar repositories for nemesis
Users that are interested in nemesis are comparing it to the libraries listed below
Sorting:
- Interactive shellcoding environment to easily craft shellcodes☆907Feb 26, 2021Updated 5 years ago
- Modern tactical exploitation toolkit.☆859Nov 8, 2025Updated 3 months ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- Advanced Netstat Using Python For Windows☆46Aug 21, 2017Updated 8 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Apr 27, 2023Updated 2 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Mar 22, 2018Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- ☆229May 10, 2018Updated 7 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- XFLTReaT tunnelling framework☆329Jan 16, 2020Updated 6 years ago
- ARCH : ARM, ARM64, MIPS, PPC, X86☆86Apr 9, 2019Updated 6 years ago
- A fully functional DanderSpritz lab in 2 commands☆447May 16, 2019Updated 6 years ago
- Yet Another MOnitoring Tool☆61Apr 21, 2018Updated 7 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆418Aug 10, 2023Updated 2 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- A tool to elevate privilege with Windows Tokens☆1,053Oct 6, 2023Updated 2 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- An information gathering tool to collect git commit emails in version control host services☆152May 5, 2019Updated 6 years ago
- Monitors for DCSYNC and DCSHADOW attacks and create custom Windows Events for these events.☆141Mar 7, 2018Updated 7 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- Ivan Ricart Borges - Program to detect the existence of remote/local stack-based buffer-overflow vulnerabilities using the standard commu…☆54May 15, 2021Updated 4 years ago
- Forward local or remote tcp ports through SMB pipes.☆296Mar 7, 2021Updated 4 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆399May 20, 2020Updated 5 years ago
- A Report Generation Tool for Security Assessment☆65Dec 31, 2018Updated 7 years ago
- Automated Tactics Techniques & Procedures☆259May 26, 2023Updated 2 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Windows passwords decryption from dump files☆511Feb 2, 2023Updated 3 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Dec 4, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago