stivenhacker / GhostStrikeLinks
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆806Updated last year
Alternatives and similar repositories for GhostStrike
Users that are interested in GhostStrike are comparing it to the libraries listed below
Sorting:
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆576Updated 2 months ago
- C2 infrastructure over Microsoft Teams.☆735Updated 11 months ago
- secator - the pentester's swiss knife☆1,220Updated last week
- Pen Test Report Generation and Assessment Collaboration☆585Updated 3 weeks ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆281Updated last year
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,263Updated last month
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆516Updated 6 months ago
- This repository contains detailed adversary simulation APT campaigns targeting various critical sectors. Each simulation includes custom …☆994Updated this week
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆730Updated last month
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆445Updated 7 months ago
- 🏴 ☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆216Updated 4 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆463Updated 3 weeks ago
- MCP Server for Metasploit☆412Updated 3 months ago
- The useful exploit finder☆816Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆434Updated this week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated last month
- WiFi Penetration Testing & Auditing Tool☆661Updated 8 months ago
- An offensive data enrichment pipeline☆882Updated this week
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,268Updated 6 months ago
- NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive secu…☆598Updated this week
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆1,335Updated 2 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,128Updated last year
- AI-powered penetration testing assistant for automating recon, note-taking, and vulnerability analysis.☆838Updated last month
- Open-Source Phishing Toolkit☆262Updated 5 months ago
- Nmap Dashboard Mini Project☆621Updated last year
- Pentest Copilot is an AI-powered browser based ethical hacking assistant tool designed to streamline pentesting workflows.☆247Updated last week
- Autonomous Privilege Escalation using AI☆845Updated last month
- A visual methodology tracking platform tailored for offensive security assessments☆236Updated 3 months ago
- Bitor Scanning Software☆439Updated 2 months ago
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆407Updated 8 months ago