Orc is a post-exploitation framework for Linux written in Bash
☆402Nov 12, 2019Updated 6 years ago
Alternatives and similar repositories for Orc
Users that are interested in Orc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Jul 26, 2018Updated 7 years ago
- mOrc is a post-exploitation framework for macOS written in Bash☆19Apr 19, 2023Updated 2 years ago
- Bash post exploitation toolkit☆748Apr 1, 2026Updated last week
- Powershell script for enumerating vulnerable DCOM Applications☆265Nov 30, 2018Updated 7 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 4 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A PowerShell example of the Windows zero day priv esc☆328Sep 12, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- ☆110May 14, 2018Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆400May 20, 2020Updated 5 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- ☆183Feb 21, 2022Updated 4 years ago
- A script that automates generation of OpenSSL reverse shells☆303Sep 24, 2020Updated 5 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Red Team Tips as posted by @vysecurity on Twitter☆1,116Apr 26, 2020Updated 5 years ago
- Pypykatz agent implemented in .NET☆84Mar 15, 2019Updated 7 years ago
- framework to rapidly implement custom droppers for all three major operating systems☆704Feb 24, 2024Updated 2 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆72Aug 31, 2020Updated 5 years ago
- C# Targeted Attack Reconnissance Tools☆120Jan 11, 2021Updated 5 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 8 years ago
- Example VBA Macro for MacOS Mojave☆67Oct 31, 2018Updated 7 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Jul 10, 2024Updated last year
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Hide processes as a normal user in Linux.☆261Jul 10, 2024Updated last year
- PowerShell Runspace Post Exploitation Toolkit☆1,549Aug 2, 2019Updated 6 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,335Dec 6, 2023Updated 2 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆300Oct 2, 2019Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆470Jul 10, 2024Updated last year
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- SharpCompile is an aggressor script for Cobalt Strike which allows you to compile and execute C# in realtime. This is a more slick approa…☆290Aug 7, 2020Updated 5 years ago
- HTA encryption tool for RedTeams☆1,423Nov 9, 2022Updated 3 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆386Dec 13, 2020Updated 5 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,125Feb 10, 2021Updated 5 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- Pop shells like a master.☆1,489Apr 2, 2019Updated 7 years ago