stivenhacker / GhostStrikeLinks
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆781Updated 9 months ago
Alternatives and similar repositories for GhostStrike
Users that are interested in GhostStrike are comparing it to the libraries listed below
Sorting:
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆541Updated 2 months ago
- C2 infrastructure over Microsoft Teams.☆688Updated 4 months ago
- secator - the pentester's swiss knife☆1,051Updated this week
- Pen Test Report Generation and Assessment Collaboration☆526Updated last week
- The useful exploit finder☆813Updated last year
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆509Updated 5 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆272Updated last year
- Bitor Scanning Software☆380Updated 3 weeks ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,229Updated 10 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆365Updated 3 weeks ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆941Updated 2 months ago
- Open Adversary Exposure Validation Platform☆1,040Updated this week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆345Updated this week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆908Updated last week
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆658Updated last month
- Autonomous Privilege Escalation using AI☆782Updated 2 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆731Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆676Updated this week
- Phone: A Mobile Phone Forensic Framework ( Android )☆199Updated 2 months ago
- Nmap Dashboard Mini Project☆587Updated 11 months ago
- This is for Ethical Use only.☆389Updated 2 weeks ago
- WiFi Penetration Testing & Auditing Tool☆519Updated last month
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆1,923Updated this week
- ☆312Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,072Updated this week
- All-in-One Toolkit for BruteForce Attacks☆756Updated 8 months ago
- TerminatorZ is a highly sophisticated and efficient web security tool that scans for top potential vulnerabilities with known CVEs in you…☆277Updated 9 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,009Updated 10 months ago
- The Ultimate Information Gathering Toolkit☆2,060Updated 7 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,021Updated 2 weeks ago