stivenhacker / GhostStrikeLinks
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆809Updated last year
Alternatives and similar repositories for GhostStrike
Users that are interested in GhostStrike are comparing it to the libraries listed below
Sorting:
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆580Updated 3 months ago
- C2 infrastructure over Microsoft Teams.☆737Updated last year
- The useful exploit finder☆825Updated 3 weeks ago
- Autonomous Privilege Escalation using AI☆851Updated 2 months ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,301Updated 2 months ago
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 7 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆279Updated 2 years ago
- Pen Test Report Generation and Assessment Collaboration☆589Updated 2 weeks ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆1,035Updated 3 weeks ago
- Bitor Scanning Software☆454Updated 3 months ago
- Nmap Dashboard Mini Project☆627Updated last year
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆1,361Updated 3 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,290Updated 7 months ago
- secator - the pentester's swiss knife☆1,236Updated this week
- An offensive data enrichment pipeline☆895Updated this week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆471Updated this week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated 2 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆219Updated 5 months ago
- Open Adversarial Exposure Validation Platform☆1,609Updated this week
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆385Updated last week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated last week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆811Updated 10 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆724Updated 6 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆239Updated 4 months ago
- NeuroSploit is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive securi…☆738Updated 2 weeks ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆448Updated 8 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆785Updated last year
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆879Updated 3 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago
- MCP Server for Metasploit☆479Updated 4 months ago