SILENTTRINITY
Post-exploitation tool
An asynchronous, collaborative post-exploitation framework that uses .NET's DLR to dynamically call APIs and offers features like multi-user collaboration, real-time updates, and dynamic compilation of tasks.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
2k stars
111 watching
403 forks
Language: Boo
last commit: 12 months ago
Linked from 3 awesome lists
boolangc-sharpdotnetdotnet-dlrdotnet-scriptironpythonpost-exploitationpython3red-teamssecurity-tools
Related projects:
Repository | Description | Stars |
---|---|---|
emilyanncr/windows-post-exploitation | Provides tools and resources for post-exploitation techniques on Windows systems during penetration testing | 524 |
bats3c/shad0w | A post-exploitation toolset designed to operate covertly on heavily monitored environments. | 2,045 |
d4rk007/redghost | A post exploitation framework designed to assist in persistence, reconnaissance, and privilege escalation on Linux systems | 536 |
enkomio/alanframework | A post-exploitation framework that enables red-team activities by providing a set of tools for infiltrating and controlling systems remotely. | 462 |
cobbr/sharpsploit | A post-exploitation toolkit for .NET environments | 1,750 |
lazytitan33/dns-exfilnspector | Automatically decodes DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator | 8 |
mubix/post-exploitation | A collection of post-exploitation tools and scripts for various operating systems. | 1,554 |
bluscreenofjeff/aggressorscripts | A collection of Cobalt Strike scripts designed to facilitate red teaming and exploitation | 787 |
byt3bl33d3r/deathstar | Automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using offensive TTPs | 1,585 |
voulnet/barq | An AWS-focused post-exploitation framework that enables attackers to compromise running EC2 instances without needing original credentials. | 386 |
acsdavid97/dotnethooker | Tools for tracing and analyzing .NET function calls and argument dumps to aid in reverse engineering malware. | 5 |
pp00704831/banet-tip-2022 | A PyTorch implementation of an attention network for dynamic scene deblurring | 37 |
shadow-workers/shadow-workers | Tool designed to facilitate exploitation of XSS and malicious Service Workers in penetration testing | 220 |
lucacasonato/deno-puppeteer | A port of Puppeteer running on Deno, providing a high-level API to control headless Chrome or Firefox. | 453 |
alicangnll/pyshadow | Analyzes and recovers deleted data from Windows shadow copies | 5 |