Remote CLI tools at your fingertips
-
Updated
Jul 16, 2024 - Python
Remote CLI tools at your fingertips
This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
🏴☠️ BST is an ever-evolving collection of 🛠 tools to help in security and administration tasks 😉
Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.
Villain is a high level stage 0/1 C2 framework that can handle multiple TCP socket & HoaxShell-based reverse shells, enhance their functionality with additional features (commands, utilities) and share them among connected sibling servers (Villain instances running on different machines).
Fast TCP port scanner in Python
A command and control (C2) server
Scripts for red team / pen-testing.
A C2 framework in python
一键生成免杀木马的 shellcode 免杀框架
The Extractor is a Python script that extracts Google dorks from the official Google Hacking Database (GHDB) XML file and saves them in a CSV file. The script only extracts dorks that contain the "inurl:" operator because they are more specific and useful for targeted web scanning.
GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments
pure-python implementation of MemoryModule technique to load dll and unmanaged exe entirely from memory
RT-MASK: Red Team Mask for IPv4 to IPv6 Obfuscation
Command line tool to fetch vulnerability information from National Vulnerability Database.
Onebot 实现 Cobalt strike 上线消息推送到QQ群
load PE in memory Filelessly
A sophisticated PowerShell C2 client for remote command execution and reporting. It includes a Windows reverse shell payload generator and handler using the HTTPS protocol. The client polls a Python-based web server (REST API) for commands, executes them locally, and returns the results.
WEB-Wordlist-Generator creates related wordlists after scanning your web applications.
DANGER! DO NOT USE IT! I WARN YOU BEFORE! This script monitors and intercepts Tor traffic to detect and handle malicious activity. It utilizes the Scapy and Stem libraries to analyze network packets and interact with the Tor network.
Add a description, image, and links to the redteam-tools topic page so that developers can more easily learn about it.
To associate your repository with the redteam-tools topic, visit your repo's landing page and select "manage topics."