Downloads , Hacking Tools , Havoc , Obfuscation , Post-Exploitation , Python , Syscalls Havoc is in an early state of release. Breaking changes may be made to APIs/core structures as the framework matures. …
December 27, 2022, 2:12 AM December 27, 2022 33
Ai , Deception Detection , Downloads , Hacking Tools , Host Exploitation , Machine Learning , Post-Exploitation , ransomware , Ransomware Simulation , Shennina Shennina is an automated host exploitation framework. The mission of the project is to fully automate the scanning, vulnerability scanning/analysis, …
December 19, 2022, 10:05 PM December 19, 2022 113
Downloads , Hacking Tools , NTLM , Post-Exploitation , Proof Of Concept , SCCM , SharpSCCM SharpSCCM is a post-exploitation tool designed to leverage Microsoft Endpoint Configuration Manager (a.k.a. ConfigMgr, formerly SCCM) for lateral movement and …
November 26, 2022, 3:57 PM November 26, 2022 139
Downloads , Hacking Tools , Offensive Security , Pentest Tool , Post-Exploitation , Redteam An advanced, yet simple, tunneling tool that uses a TUN interface. by TNP IT Security Introduction Ligolo-ng is a simple, …
September 6, 2021, 2:03 PM September 6, 2021 280
Downloads , Hacking Tool , Hacking Tools , Post-Exploitation , Red Team , Red Teaming Alan Framework is a post-exploitation framework useful during red-team activities. If you find my tool useful, please consider to sponsor …
August 13, 2021, 3:25 AM August 13, 2021 247
Downloads , Hacking Tools , Library , Linux , Listener , Penetration Testing , Pentesting , Post-Exploitation , Privesc , Privilege Escalation , Python , Reconnaissance , Windows Nebula is a Cloud and (hopefully) DevOps Penetration Testing framework. It is build with modules for each provider and each …
June 13, 2021, 4:29 PM June 13, 2021 326
Active Directory , DCSYNC , Downloads , Hacking Tools , LDAP , Post-Exploitation , Takeover , Windows , Windows 10 , Yara StandIn is a small AD post-compromise toolkit. StandIn came about because recently at xforcered we needed a .NET native solution …
March 2, 2021, 3:49 AM March 2, 2021 509
Ansible , Backdoor , Downloads , Hacking Tools , MOSE , Post-Exploitation MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies …
February 1, 2021, 7:11 PM February 23, 2021 338
Android , Android Debug Bridge , Android Device , Android Exploit , Android Hack , Android Hacking , Android RAT , Downloads , Ghost Framework , Hacking Tools , Post-Exploitation About Ghost Framework Ghost Framework is an Android post-exploitation framework that exploits theAndroid Debug Bridge to remotely access an Android …
December 17, 2020, 2:17 AM February 23, 2021 856
Command And Control , Command Line , Downloads , Hacking Tools , Mac , MacC2 , MacOS , OpenSSL , Post-Exploitation , Python , Python2 , Python3 , Remote , Sandbox , Sandboxed , Scripting , Scripts MacC2 is a macOS post exploitation tool written in python that uses Objective C calls or python libraries as opposed …
November 17, 2020, 4:04 PM February 23, 2021 425