stivenhacker / GhostStrike
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆740Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for GhostStrike
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆493Updated 6 months ago
- secator - the pentester's swiss knife☆868Updated last week
- Pen Test Report Generation and Assessment Collaboration☆444Updated last week
- WiFi Penetration Testing & Auditing Tool☆406Updated last month
- All-in-One Toolkit for BruteForce Attacks☆382Updated last month
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆495Updated 5 months ago
- The useful exploit finder☆784Updated 7 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆879Updated this week
- An OSINT / digital forensics tool built in Python☆328Updated 2 weeks ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆683Updated 5 months ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,060Updated 4 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆189Updated 10 months ago
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆214Updated last week
- Nmap Dashboard Mini Project☆540Updated 5 months ago
- The Ultimate Information Gathering Toolkit☆1,200Updated last month
- ☆304Updated 7 months ago
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆397Updated 5 months ago
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆936Updated this week
- Deep Linux runtime visibility meets Wireshark☆244Updated 2 weeks ago
- An offensive data enrichment pipeline☆616Updated 2 months ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆389Updated 2 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆172Updated last week
- ☆268Updated 5 months ago
- Simple Windows and Linux keystroke injection tool that exfiltrates stored WiFi data (SSID and password).☆370Updated 8 months ago
- ☆493Updated 7 months ago
- HTTP 403 bypass tool☆469Updated 8 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆258Updated 2 months ago
- Little user-mode AV/EDR evasion lab for training & learning purposes☆1,010Updated 6 months ago
- AI-Powered Ethical Hacking Assistant☆456Updated 4 months ago