t3l3machus / Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
☆3,880Updated 2 months ago
Alternatives and similar repositories for Villain:
Users that are interested in Villain are comparing it to the libraries listed below
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,095Updated 5 months ago
- The Havoc Framework☆7,085Updated this week
- The Network Execution Tool☆3,487Updated this week
- Arsenal is just a quick inventory and launcher for hacking programs☆3,258Updated last month
- Tools and Techniques for Red Team / Penetration Testing☆6,217Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,147Updated 2 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,656Updated last month
- Adversary Emulation Framework☆8,782Updated this week
- Fancy reverse and bind shell handler☆2,674Updated 5 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,858Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,584Updated last month
- Rockyou for web fuzzing☆2,665Updated 4 months ago
- A swiss army knife for pentesting networks☆8,542Updated last year
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,049Updated 2 weeks ago
- Tools and Techniques for Blue Team / Incident Response☆2,901Updated 9 months ago
- Generates millions of keyword-based password mutations in seconds.☆1,244Updated 5 months ago
- Attack Surface Management Platform☆8,313Updated 2 weeks ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,260Updated 7 months ago
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- Monitor linux processes without root permissions☆5,059Updated 2 years ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,343Updated this week
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆16,618Updated this week
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,813Updated 2 years ago
- Gather and update all available and newest CVEs with their PoC.☆6,693Updated this week
- An XSS exploitation command-line interface and payload generator.☆1,284Updated 2 weeks ago
- Fully featured and community-driven hacking environment☆2,035Updated last month
- A script that you can run in the background!☆2,777Updated 5 months ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆8,916Updated 8 months ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,405Updated last month
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,271Updated 2 weeks ago