stivenhacker / GhostStrike
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆772Updated 8 months ago
Alternatives and similar repositories for GhostStrike
Users that are interested in GhostStrike are comparing it to the libraries listed below
Sorting:
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆536Updated 2 months ago
- secator - the pentester's swiss knife☆1,015Updated this week
- Pen Test Report Generation and Assessment Collaboration☆521Updated last week
- C2 infrastructure over Microsoft Teams.☆675Updated 4 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆725Updated last week
- The useful exploit finder☆808Updated last year
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆509Updated 5 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆337Updated this week
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆271Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,014Updated this week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆749Updated last month
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆997Updated 9 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆649Updated 3 weeks ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆332Updated last month
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆198Updated last week
- Phishing with a fake reCAPTCHA☆548Updated 8 months ago
- Bitor Scanning Software☆376Updated last month
- WiFi Penetration Testing & Auditing Tool☆517Updated 2 weeks ago
- Autonomous Privilege Escalation using AI☆750Updated last month
- This is for Ethical Use only.☆363Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆666Updated this week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆938Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆367Updated 3 months ago
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆122Updated 2 weeks ago
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆813Updated last week
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆378Updated last month
- An offensive data enrichment pipeline☆675Updated last month
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆730Updated last month
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆795Updated 3 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆741Updated 4 months ago