t3l3machus / VillainLinks
Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
☆4,232Updated 3 months ago
Alternatives and similar repositories for Villain
Users that are interested in Villain are comparing it to the libraries listed below
Sorting:
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,327Updated 7 months ago
- The Havoc Framework☆7,821Updated 2 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,573Updated 3 months ago
- An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.☆3,879Updated 3 months ago
- The Network Execution Tool☆4,671Updated last week
- evilginx3 + gophish☆1,867Updated last year
- Generates millions of keyword-based password mutations in seconds.☆1,348Updated 3 months ago
- Adversary Emulation Framework☆9,978Updated 2 weeks ago
- Fancy reverse and bind shell handler☆2,809Updated last year
- Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.☆4,832Updated last week
- A collaborative, multi-platform, red teaming framework☆3,969Updated this week
- Fully featured and community-driven hacking environment☆2,549Updated this week
- Arsenal is just a quick inventory and launcher for hacking programs☆3,558Updated 9 months ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,913Updated 5 months ago
- The ultimate WinRM shell for hacking/pentesting☆5,018Updated last week
- game of active directory☆6,853Updated 2 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,058Updated 2 weeks ago
- Pentest Report Generator☆2,622Updated 2 weeks ago
- Codebase to generate an msdt-follina payload☆1,625Updated 3 years ago
- Tools and Techniques for Red Team / Penetration Testing☆7,294Updated 6 months ago
- An XSS exploitation command-line interface and payload generator.☆1,392Updated 7 months ago
- A collection of awesome Command & Control (C2) frameworks, tools and resources for post-exploitation and red teaming assignments.☆901Updated 4 years ago
- An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws☆3,677Updated 6 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,692Updated 3 months ago
- Active Directory and Internal Pentest Cheatsheets☆1,733Updated 2 weeks ago
- Wi-Fi Exploitation Framework☆2,597Updated 3 months ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,505Updated last year
- Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!☆1,801Updated last week
- Starkiller is a Frontend for PowerShell Empire.☆1,555Updated 2 weeks ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,276Updated 5 months ago