t3l3machus / VillainLinks
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
☆4,157Updated last month
Alternatives and similar repositories for Villain
Users that are interested in Villain are comparing it to the libraries listed below
Sorting:
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,278Updated 5 months ago
- The Havoc Framework☆7,677Updated 5 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,463Updated last month
- Arsenal is just a quick inventory and launcher for hacking programs☆3,467Updated 7 months ago
- Fancy reverse and bind shell handler☆2,768Updated 11 months ago
- The Network Execution Tool☆4,411Updated this week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,641Updated last month
- Generates millions of keyword-based password mutations in seconds.☆1,332Updated last month
- Fully featured and community-driven hacking environment☆2,476Updated last week
- Wi-Fi Exploitation Framework☆2,566Updated 3 weeks ago
- The ultimate WinRM shell for hacking/pentesting☆4,922Updated 7 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,016Updated this week
- game of active directory☆6,623Updated 4 months ago
- Codebase to generate an msdt-follina payload☆1,624Updated 3 years ago
- evilginx3 + gophish☆1,828Updated last year
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,588Updated last month
- Adversary Emulation Framework☆9,647Updated 2 weeks ago
- ☆2,275Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,683Updated last week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,857Updated 3 months ago
- An XSS exploitation command-line interface and payload generator.☆1,382Updated 5 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆3,070Updated last week
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,158Updated 3 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,854Updated 3 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,603Updated 2 weeks ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆1,453Updated 2 years ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,427Updated 2 months ago
- A script that you can run in the background!☆2,869Updated 11 months ago
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,873Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,313Updated 10 months ago