mazen160 / shennina
Automating Host Exploitation with AI
☆524Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for shennina
- Script for generating revshells☆454Updated 2 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆441Updated this week
- TOP All bugbounty pentesting CVE-2023- POC Exp RCE example payload Things☆668Updated this week
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,409Updated 3 months ago
- A python script to scan for Apache Tomcat server vulnerabilities.☆793Updated last month
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆506Updated 9 months ago
- Nuclei AI - Browser Extension for Rapid Nuclei Template Generation☆448Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,268Updated 4 months ago
- Multiplatform Python WebShell☆295Updated last month
- ☆1,790Updated 11 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆936Updated this week
- A tool uses Windows Filtering Platform (WFP) to block Endpoint Detection and Response (EDR) agents from reporting security events to the …☆1,486Updated 2 weeks ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,338Updated 11 months ago
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆1,804Updated last month
- Automatic SSTI detection tool with interactive interface☆826Updated last month
- Sticky notes for pentesting, bug bounty, CTF.☆623Updated 2 weeks ago
- evilginx3 + gophish☆1,668Updated 5 months ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆539Updated 2 months ago
- Killer tool is designed to bypass AV/EDR security tools using various evasive techniques.☆759Updated 4 months ago
- Asset discovery and identification tools 快速识别 Web 指纹信息,定位资产类型。辅助红队快速定位目标资产信息,辅助蓝队发现疑似脆弱点☆2,027Updated 9 months ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,084Updated 4 months ago
- ☆671Updated 8 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆830Updated last year
- A Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions☆451Updated last year
- PowerShell Ransomware Simulator with C2 Server☆465Updated 10 months ago
- HVNC for Cobalt Strike☆1,164Updated 11 months ago
- ☆215Updated 4 months ago
- Command & Control-Framework created for collaboration in python3☆309Updated last year