Windows Persistence Toolsets(Windows 平台下权限维持集成工具)
-
Updated
May 27, 2024 - Go
Windows Persistence Toolsets(Windows 平台下权限维持集成工具)
The Most Advanced Client-Side Prototype Pollution Scanner
Use favicon.ico to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.
Discover new target domains using Content Security Policy
Adversary Simulators High-Fidelity Intelligence and Reporting Toolkit
An advanced, yet simple, tunneling/pivoting tool that uses a TUN interface.
A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams/Lark/Telegram & Pushover support
Generates the tree of the directory listing page.
Multiplayer pivoting solution
Yet another tool to dump a git repository from a website, focused on as-complete-as-possible dumps and handling weird edge-cases.
The subdomain enumeration tool to replace all subdomain enumeration tools
eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features
Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, and Benchmarks.
Malicious Go code for red teaming/pentesting
☠️ The Pathwar Project ☠️
A tool PoC that demonstrate how to leverage Osquery interactive shell named pipe implementation to enumerate windows machines.
Go shellcode loader that combines multiple evasion techniques
Lurker is a cross-platform, companion implant to Cobalt Strike built with Go
A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.
Add a description, image, and links to the offensive-security topic page so that developers can more easily learn about it.
To associate your repository with the offensive-security topic, visit your repo's landing page and select "manage topics."