shad0w
Covert toolkit
A post-exploitation toolset designed to operate covertly on heavily monitored environments.
A post exploitation framework designed to operate covertly on heavily monitored environments
2k stars
59 watching
324 forks
Language: C
last commit: about 3 years ago
Linked from 1 awesome list
cc2dockerdotnetred-teamshad0wshellcode
Related projects:
Repository | Description | Stars |
---|---|---|
d4rk007/redghost | A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 536 |
byt3bl33d3r/silenttrinity | An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks. | 2,196 |
emilyanncr/windows-post-exploitation | Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 524 |
mubix/post-exploitation | A collection of post-exploitation tools and scripts for various operating systems. | 1,554 |
tobysalusky/cont3xt | Centralizes and simplifies the gathering of contextual intelligence in support of technical investigations. | 36 |
0xsp-srd/mortar | A toolset designed to evade detection by security products and execute malware safely | 1,410 |
darkcode357/thg-framework | A Python-based toolkit for rapid exploit development and testing | 8 |
beahunt3r/windows-hunting | A collection of tools and resources to aid Windows threat hunters in identifying common security artifacts. | 347 |
d3ckx1/ola | A CS backdoor penetration module plugin that bundles various tools and features into a single package for convenience | 626 |
a-poc/redteam-tools | A collection of tools and resources for simulating a red teaming attack on computer systems. | 6,004 |
rasta-mouse/aggressor-script | A collection of custom PowerShell scripts designed to aid in the exploitation and persistence of compromised systems | 171 |
qax-a-team/cobaltstrike-toolset | A collection of tools and scripts used to simulate cyber attacks | 532 |
d4stiny/spectre | A proof-of-concept Windows kernel-mode rootkit designed to demonstrate legitimate communication channel exploitation for remote control. | 685 |
enkomio/alanframework | A post-exploitation framework that enables red-team activities by providing a set of tools for infiltrating and controlling systems remotely. | 462 |
nullsecuritynet/tools | Provides tools, exploits, and code snippets for security research and education purposes. | 39 |