A collection of hacking tools, resources and references to practice ethical hacking.
-
Updated
Aug 31, 2022
A collection of hacking tools, resources and references to practice ethical hacking.
fsociety Hacking Tools Pack – A Penetration Testing Framework
An open-source post-exploitation framework for students, researchers and developers.
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
A tool to dump the login password from the current linux user
Redteam operation platform with webui 图形化红队行动辅助平台
An evil RAT (Remote Administration Tool) for macOS / OS X.
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.
An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR
Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor
venom - C2 shellcode generator/compiler/handler
Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
C2/post-exploitation framework
Linux/Windows post-exploitation framework made by linux user
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Load shellcode into a new process
A Python Package for Data Exfiltration
Add a description, image, and links to the post-exploitation topic page so that developers can more easily learn about it.
To associate your repository with the post-exploitation topic, visit your repo's landing page and select "manage topics."