stivenhacker / GhostStrikeLinks
Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations.
☆799Updated last year
Alternatives and similar repositories for GhostStrike
Users that are interested in GhostStrike are comparing it to the libraries listed below
Sorting:
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆552Updated 5 months ago
- C2 infrastructure over Microsoft Teams.☆710Updated 7 months ago
- secator - the pentester's swiss knife☆1,136Updated this week
- Autonomous Privilege Escalation using AI☆829Updated 5 months ago
- The useful exploit finder☆812Updated last year
- Pen Test Report Generation and Assessment Collaboration☆559Updated this week
- A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Inte…☆1,103Updated this week
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆405Updated 3 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆273Updated last year
- Advanced LLM-powered brute-force tool combining AI intelligence with automated login attacks☆354Updated last month
- RansomLord is a proof-of-concept Anti-Ransomware exploitation tool that automates the creation of PE files, used to compromise ransomware…☆518Updated 2 months ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆203Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆408Updated this week
- Phishing with a fake reCAPTCHA☆604Updated 11 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆442Updated this week
- Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.☆550Updated last month
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆718Updated last week
- An offensive data enrichment pipeline☆832Updated this week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆996Updated 5 months ago
- Bitor Scanning Software☆404Updated 3 weeks ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆799Updated 5 months ago
- Nmap Dashboard Mini Project☆613Updated last year
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆139Updated this week
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,236Updated last year
- 🧙♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications☆1,189Updated 2 months ago
- WiFi Penetration Testing & Auditing Tool☆546Updated 4 months ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆753Updated 7 months ago
- ☆314Updated last year
- Open-Source Phishing Toolkit☆223Updated last month
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,052Updated last year