NetCatXVIII

NetCatXVIII

Geek Repo

Github PK Tool:Github PK Tool

NetCatXVIII's starred repositories

AntiOS

Pyhton scripts that can change your Windows fingerprints and ID

Language:PythonStargazers:359Issues:0Issues:0

VBoxBasedAntidetect

Source code of VirtualBox OSE based Antidetect

Stargazers:7Issues:0Issues:0

Xerror

fully automated pentesting tool

Language:CSSStargazers:495Issues:0Issues:0

sliver-gui

A Sliver GUI Client

Language:TypeScriptLicense:NOASSERTIONStargazers:288Issues:0Issues:0

reasonably-secure-electron

A pattern for reasonably secure Electron applications

Language:TypeScriptLicense:NOASSERTIONStargazers:71Issues:0Issues:0

UACME

Defeating Windows User Account Control

Language:CLicense:BSD-2-ClauseStargazers:6098Issues:0Issues:0

ShellcodeFluctuation

An advanced in-memory evasion technique fluctuating shellcode's memory protection between RW/NoAccess & RX and then encrypting/decrypting its contents

Language:C++License:MITStargazers:875Issues:0Issues:0

PackMyPayload

A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file formats. Supports: ZIP, 7zip, PDF, ISO, IMG, CAB, VHD, VHDX

Language:PythonLicense:MITStargazers:821Issues:0Issues:0

Penetration-Testing-Tools

A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes.

Language:PowerShellLicense:MITStargazers:2495Issues:0Issues:0

RedWarden

Cobalt Strike C2 Reverse proxy that fends off Blue Teams, AVs, EDRs, scanners through packet inspection and malleable profile correlation

Language:PythonLicense:GPL-3.0Stargazers:888Issues:0Issues:0

domainhunter

Checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names

Language:PythonLicense:BSD-3-ClauseStargazers:1497Issues:0Issues:0

sshtunnel

🚇 Ultra simple SSH tunnelling for Go programs.

Language:GoLicense:MITStargazers:298Issues:0Issues:0

c2go

⚖️ A tool for transpiling C to Go.

Language:GoLicense:MITStargazers:2059Issues:0Issues:0

TripleCross

A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.

Language:CLicense:GPL-3.0Stargazers:1738Issues:0Issues:0

shad0w

A post exploitation framework designed to operate covertly on heavily monitored environments

Language:CLicense:MITStargazers:2014Issues:0Issues:0

AlanFramework

A C2 post-exploitation framework

Language:AssemblyLicense:NOASSERTIONStargazers:460Issues:0Issues:0

Heroinn

A cross platform C2/post-exploitation framework.

Language:RustLicense:GPL-3.0Stargazers:630Issues:0Issues:0

Empire

Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers.

Language:PowerShellLicense:BSD-3-ClauseStargazers:4070Issues:0Issues:0

ibombshell

Tool to deploy a post-exploitation prompt at any time

Language:PythonLicense:GPL-3.0Stargazers:306Issues:0Issues:0

Mythic

A collaborative, multi-platform, red teaming framework

Language:JavaScriptLicense:NOASSERTIONStargazers:3044Issues:0Issues:0

Nuages

A modular C2 framework

Language:JavaScriptLicense:NOASSERTIONStargazers:387Issues:0Issues:0

PowerHub

A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting

Language:PowerShellLicense:MITStargazers:704Issues:0Issues:0

trevorc2

TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.

Language:CLicense:NOASSERTIONStargazers:1203Issues:0Issues:0

sliver

Adversary Emulation Framework

Language:GoLicense:GPL-3.0Stargazers:7968Issues:0Issues:0

caldera

Automated Adversary Emulation Platform

Language:PythonLicense:Apache-2.0Stargazers:5371Issues:0Issues:0