shad0w

Covert toolkit

A post-exploitation toolset designed to operate covertly on heavily monitored environments.

A post exploitation framework designed to operate covertly on heavily monitored environments

GitHub

2k stars
59 watching
324 forks
Language: C
last commit: about 3 years ago
Linked from 1 awesome list

cc2dockerdotnetred-teamshad0wshellcode

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
d4rk007/redghost A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems 536
byt3bl33d3r/silenttrinity An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. 2,196
emilyanncr/windows-post-exploitation Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing 524
mubix/post-exploitation A collection of post-exploitation tools and scripts for various operating systems. 1,554
tobysalusky/cont3xt Centralizes and simplifies the gathering of contextual intelligence in support of technical investigations. 36
0xsp-srd/mortar A toolset designed to evade detection by security products and execute malware safely 1,410
darkcode357/thg-framework A Python-based toolkit for rapid exploit development and testing 8
beahunt3r/windows-hunting A collection of tools and resources to aid Windows threat hunters in identifying common security artifacts. 347
d3ckx1/ola A CS backdoor penetration module plugin that bundles various tools and features into a single package for convenience 626
a-poc/redteam-tools A collection of tools and resources for simulating a red teaming attack on computer systems. 6,004
rasta-mouse/aggressor-script A collection of custom PowerShell scripts designed to aid in the exploitation and persistence of compromised systems 171
qax-a-team/cobaltstrike-toolset A collection of tools and scripts used to simulate cyber attacks 532
d4stiny/spectre A proof-of-concept Windows kernel-mode rootkit designed to demonstrate legitimate communication channel exploitation for remote control. 685
enkomio/alanframework A post-exploitation framework that enables red-team activities by providing a set of tools for infiltrating and controlling systems remotely. 462
nullsecuritynet/tools Provides tools, exploits, and code snippets for security research and education purposes. 39