Automatically created C2 Feeds
-
Updated
Jun 28, 2024 - REXX
Automatically created C2 Feeds
x86 malware emulator
A list of web application security
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security professional, a network administrator, or a cybersecurity enthusiast
Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
A comprehensive repo delving into the realms of Network Security concepts, Basic Security Concepts, networking concepts, and essential security tools. This initiative aims to provide a hands-on exploration of crucial aspects within the cybersecurity landscape.
Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
CVEs <--> Metasploit-Framework modules
Automatic Metasploit installer & Manager For Termux Easy to use
A brute force dictionary attack script in python that takes the URL of the site and a password file to crack an account. The script is tested and run in the Metasploit environment.
İnstall TERMUX PACKAGES, METASPLOİT, NETHUNTER OR MORE TOOLS İN TERMUX
Random stuff
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
The all-in-one browser extension for offensive security professionals 🛠
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
Parser for the JSON database included in metasploit-framework that emits a CSV file of modules keyed by vulnerability IDs and references. NOTE: Superseded by git_vul_driller linked below.
Metasploit Framework plugin for the Dradis Framework
This Script will help you to gather information about your victim or friend.
Add a description, image, and links to the metasploit topic page so that developers can more easily learn about it.
To associate your repository with the metasploit topic, visit your repo's landing page and select "manage topics."