stivenhacker / GhostStrike
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆765Updated 6 months ago
Alternatives and similar repositories for GhostStrike:
Users that are interested in GhostStrike are comparing it to the libraries listed below
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆532Updated 2 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆501Updated last week
- The useful exploit finder☆805Updated 11 months ago
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆504Updated 3 months ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆641Updated last week
- ☆310Updated last year
- WiFi Penetration Testing & Auditing Tool☆495Updated 2 months ago
- C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams.☆624Updated 2 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆612Updated this week
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆264Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆928Updated last week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,172Updated 8 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆180Updated last week
- Orbit Scanning Software☆352Updated 3 weeks ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆732Updated 2 months ago
- secator - the pentester's swiss knife☆977Updated last week
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,801Updated this week
- A resource containing all the tools each ransomware gangs uses☆992Updated last week
- Autonomous Privilege Escalation using OpenAI☆241Updated this week
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆352Updated 5 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆625Updated 9 months ago
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆261Updated 3 weeks ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆511Updated 7 months ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆368Updated last month
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆325Updated this week
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆148Updated 3 weeks ago
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,214Updated last month
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆689Updated 10 months ago
- This is for Ethical Use only! Update:- Currently the payloads can only bypass latest real time monitoring and not cloud based detections,…☆220Updated 3 weeks ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆293Updated last year