stivenhacker / GhostStrikeLinks
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆802Updated last year
Alternatives and similar repositories for GhostStrike
Users that are interested in GhostStrike are comparing it to the libraries listed below
Sorting:
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆574Updated last month
- secator - the pentester's swiss knife☆1,208Updated this week
- C2 infrastructure over Microsoft Teams.☆730Updated 11 months ago
- Autonomous Privilege Escalation using AI☆849Updated 3 weeks ago
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 6 months ago
- Pen Test Report Generation and Assessment Collaboration☆584Updated 2 weeks ago
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,242Updated last month
- Nmap Dashboard Mini Project☆621Updated last year
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆1,232Updated last month
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆278Updated last year
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆212Updated 3 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆461Updated last week
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆443Updated 6 months ago
- Bitor Scanning Software☆436Updated last month
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,012Updated 9 months ago
- The useful exploit finder☆815Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆718Updated 4 months ago
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,267Updated 6 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆773Updated last week
- Records an executable's network activity into a Full Packet Capture file (.pcap) and much more.☆452Updated last month
- A visual methodology tracking platform tailored for offensive security assessments☆233Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆430Updated last week
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆686Updated 3 weeks ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆152Updated 2 weeks ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆331Updated 7 months ago
- Phishing with a fake reCAPTCHA☆628Updated last year
- AI-Powered Dark Web OSINT Tool☆2,167Updated 2 weeks ago
- An offensive data enrichment pipeline☆879Updated last week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆478Updated last week
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆808Updated 8 months ago