t3l3machus / Villain
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
☆3,971Updated 2 months ago
Alternatives and similar repositories for Villain:
Users that are interested in Villain are comparing it to the libraries listed below
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,177Updated 2 months ago
- The Havoc Framework☆7,394Updated 2 months ago
- The ultimate WinRM shell for hacking/pentesting☆4,784Updated 4 months ago
- The Network Execution Tool☆3,714Updated this week
- Adversary Emulation Framework☆9,104Updated this week
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,269Updated 5 months ago
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,462Updated this week
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,370Updated 9 months ago
- A script that you can run in the background!☆2,830Updated 8 months ago
- Tools and Techniques for Red Team / Penetration Testing☆6,507Updated 2 weeks ago
- Fancy reverse and bind shell handler☆2,723Updated 7 months ago
- Arsenal is just a quick inventory and launcher for hacking programs☆3,345Updated 4 months ago
- ☆2,224Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆5,969Updated last week
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,310Updated last week
- Generates millions of keyword-based password mutations in seconds.☆1,275Updated 7 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,668Updated last year
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,295Updated 3 months ago
- Monitor linux processes without root permissions☆5,314Updated 2 years ago
- A collaborative, multi-platform, red teaming framework☆3,523Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,738Updated this week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,942Updated 3 weeks ago
- Attack Surface Management Platform☆8,611Updated last month
- A fast, simple, recursive content discovery tool written in Rust.☆6,375Updated 2 weeks ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,426Updated last month
- evilginx3 + gophish☆1,750Updated 9 months ago
- 🎯 Command Injection Payload List☆3,198Updated 8 months ago
- A swiss army knife for pentesting networks☆8,654Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,249Updated 6 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,340Updated 8 months ago