sevagas / swap_digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
☆519Updated 3 years ago
Alternatives and similar repositories for swap_digger:
Users that are interested in swap_digger are comparing it to the libraries listed below
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Updated 4 years ago
- A WebSocket C2 Tool☆392Updated 7 years ago
- HTA encryption tool for RedTeams☆1,382Updated 2 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆571Updated 10 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆746Updated 6 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,050Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams☆378Updated 5 years ago
- GTRS - Google Translator Reverse Shell☆615Updated 5 months ago
- ☆393Updated 4 years ago
- socks4 reverse proxy for penetration testing☆587Updated 6 years ago
- Bash post exploitation toolkit☆727Updated last year
- A Python Package for Data Exfiltration☆772Updated 10 months ago
- Malicious Macro Generator☆826Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,105Updated 7 years ago
- A Golang implant that uses Slack as a command and control server☆461Updated 2 years ago
- Tool for extracting information from newly spawned processes☆746Updated 3 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,261Updated 3 years ago
- linikatz is a tool to attack AD on UNIX☆548Updated last year
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆295Updated 7 years ago
- Cmd.exe Command Obfuscation Generator & Detection Test Harness☆853Updated 6 years ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆912Updated 3 years ago
- A Powershell client for dnscat2, an encrypted DNS command and control tool.☆403Updated last year
- fireELF - Fileless Linux Malware Framework☆662Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆543Updated 3 years ago
- Easy files and payloads delivery over DNS☆420Updated 11 months ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆448Updated 2 years ago
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,253Updated 2 years ago
- A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting☆790Updated 2 months ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆378Updated 4 years ago