ISF (Industrial Exploitation Framework) - An exploitation framework for industrial systems with various ICS protocol clients and exploit modules.
This repository contains cutting-edge open-source security tools (OST) that will help you during adversary simulation and as information intended for threat hunter can make detection and prevention control easier. The list of tools below that could be potentially misused by threat actors such as APT and Human-Operated Ransomware (HumOR). If you want to contribute to this list send me a pull request. Table of Contents Reconnaissance Initial Access Delivery Situational Awareness Credential Dumping Privilege Escalation Defense Evasion Persistence Lateral Movement Exfiltration Miscellaneous
ISF (Industrial Exploitation Framework) - An exploitation framework for industrial systems with various ICS protocol clients and exploit modules.
A penetration testing framework for identifying and exploiting vulnerabilities.
Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.
Find RCE gadgets for CTF pwn challenges with ease.
A modern post-exploitation command and control framework with a client-server architecture and extensibility features.
Modlishka is a reverse proxy tool for intercepting and manipulating HTTP traffic, ideal for penetration testers, security researchers, and developers to analyze and test web applications.