SILENTTRINITY

Post-exploitation tool

An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks.

An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR

GitHub

2k stars
111 watching
403 forks
Language: Boo
last commit: 12 months ago
Linked from 3 awesome lists

boolangc-sharpdotnetdotnet-dlrdotnet-scriptironpythonpost-exploitationpython3red-teamssecurity-tools

Backlinks from these awesome lists:

Related projects:

Repository Description Stars
emilyanncr/windows-post-exploitation Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing 524
bats3c/shad0w A post-exploitation toolset designed to operate covertly on heavily monitored environments. 2,045
d4rk007/redghost A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems 536
enkomio/alanframework A post-exploitation framework that enables red-team activities by providing a set of tools for infiltrating and controlling systems remotely. 462
cobbr/sharpsploit A post-exploitation toolkit for .NET environments 1,750
lazytitan33/dns-exfilnspector Automatically decodes DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator 8
mubix/post-exploitation A collection of post-exploitation tools and scripts for various operating systems. 1,554
bluscreenofjeff/aggressorscripts A collection of Cobalt Strike scripts designed to facilitate red teaming and exploitation 787
byt3bl33d3r/deathstar Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs 1,585
voulnet/barq An AWS-focused post-exploitation framework that enables attackers to compromise running EC2 instances without needing original credentials. 386
acsdavid97/dotnethooker Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware. 5
pp00704831/banet-tip-2022 A PyTorch implementation of an attention network for dynamic scene deblurring 37
shadow-workers/shadow-workers Tool designed to facilitate exploitation of XSS and malicious Service Workers in penetration testing 220
lucacasonato/deno-puppeteer A port of Puppeteer running on Deno, providing a high-level API to control headless Chrome or Firefox. 453
alicangnll/pyshadow Analyzes and recovers deleted data from Windows shadow copies 5