Fork from @rsmudge/armitage
☆34Dec 6, 2022Updated 3 years ago
Alternatives and similar repositories for armitage
Users that are interested in armitage are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Apr 8, 2026Updated 3 weeks ago
- Fork from @rsmudge/armitage☆143Dec 6, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Implementation of rfc7664 dragonfly key exchange using ECC☆20Oct 12, 2018Updated 7 years ago
- A simplistic but fast Web Content Scanner written in nodejs.☆11Jun 5, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A more advanced free and open .NET obfuscator using dnlib.☆10Oct 4, 2022Updated 3 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated 2 years ago
- Get POTA spots, click on spots to tune radio to the frequency.☆11Apr 27, 2025Updated last year
- x64 Windows privilege elevation using anycall☆21May 28, 2021Updated 4 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.☆86May 7, 2023Updated 2 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- ☆106Jul 31, 2024Updated last year
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- ☆14Apr 16, 2022Updated 4 years ago
- Specify targets and run sets of tools against them☆11Apr 19, 2015Updated 11 years ago
- SecLists is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sens…☆12Aug 16, 2013Updated 12 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆19Aug 6, 2019Updated 6 years ago
- ☆18Mar 28, 2015Updated 11 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC☆24Jun 5, 2025Updated 10 months ago
- ☆18Feb 25, 2024Updated 2 years ago
- Publicly-available tools from Rogue Valley Information Security☆14Feb 5, 2025Updated last year
- Track your beacons in a redteam scoreboard☆15Oct 28, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 3 years ago
- Contain bits and informations about SGI (Silicon Graphics) computers and software, mainly SGI Tezro, O2 and Indigo2.☆19Updated this week
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆12Aug 30, 2022Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- a kernel-based keylogger for the linux kernel (v2.6.38)☆15Dec 13, 2011Updated 14 years ago