Automatically created C2 Feeds
-
Updated
Jul 9, 2024 - REXX
Automatically created C2 Feeds
A comprehensive repo delving into the realms of Network Security concepts, Basic Security Concepts, networking concepts, and essential security tools. This initiative aims to provide a hands-on exploration of crucial aspects within the cybersecurity landscape.
CVEs <--> Metasploit-Framework modules
İnstall TERMUX PACKAGES, METASPLOİT, NETHUNTER OR MORE TOOLS İN TERMUX
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.
Automatic Metasploit installer & Manager For Termux Easy to use
An Android RAT creator toolkit.
x86 malware emulator
A list of web application security
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security professional, a network administrator, or a cybersecurity enthusiast
Devil is a tool that is basically made for facebook to Hack target accounts , BruteForce Attack , grab friendlist accounts , yahoo chacker , Facbook Friend information gathering tool , auto likes reactions & much more i hope you enjoy this tool i'm not responsible if you use this tool for any illegal purpose
Cooolis-ms是一个包含了Metasploit Payload Loader、Cobalt Strike External C2 Loader、Reflective DLL injection的代码执行工具,它的定位在于能够在静态查杀上规避一些我们将要执行且含有特征的代码,帮助红队人员更方便快捷的从Web容器环境切换到C2环境进一步进行工作。
A brute force dictionary attack script in python that takes the URL of the site and a password file to crack an account. The script is tested and run in the Metasploit environment.
Random stuff
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
The all-in-one browser extension for offensive security professionals 🛠
DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Security researchers identified this technique which uses a simplified process of DLL hijacking and mock folders to bypass UAC control. I tested this on Windows 10,11 and bypassed Windows 10 UAC security feature.
Parser for the JSON database included in metasploit-framework that emits a CSV file of modules keyed by vulnerability IDs and references. NOTE: Superseded by git_vul_driller linked below.
Metasploit Framework plugin for the Dradis Framework
Add a description, image, and links to the metasploit topic page so that developers can more easily learn about it.
To associate your repository with the metasploit topic, visit your repo's landing page and select "manage topics."