pensarai / apexLinks
Automated Pentest Agent
☆21Updated this week
Alternatives and similar repositories for apex
Users that are interested in apex are comparing it to the libraries listed below
Sorting:
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆47Updated 4 months ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆94Updated 2 weeks ago
- ☆185Updated last month
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆204Updated 3 months ago
- Laravel RCE Exploitation Toolkit☆48Updated last month
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 4 months ago
- ☆13Updated 8 months ago
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆94Updated 8 months ago
- IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare☆238Updated this week
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆86Updated 9 months ago
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆165Updated 4 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 8 months ago
- CVE-2025-59501 POC code☆22Updated last month
- High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or…☆29Updated last month
- Execute shellcode via ASPNET compiler☆58Updated 2 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆41Updated 5 months ago
- reverse engineered and improved BSQLi script from Coffinxp☆15Updated last year
- AI-powered subdomain enumeration tool with local LLM analysis via Ollama - 100% private, zero API costs☆170Updated 3 weeks ago
- Recon scripts for Red Team and Web blackbox auditing☆25Updated last week
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆43Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- ☆54Updated last month
- ☆62Updated last week
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆87Updated 5 months ago
- Vast.ai Password Kracking☆92Updated last month
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆118Updated last month
- Python alternative to Mimikatz lsadump::dcshadow☆155Updated 5 months ago
- PoC that downloads an executable from a public SSL certificate☆136Updated 4 months ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆37Updated 2 months ago
- Malware traffic obfuscation library☆40Updated 4 months ago