Showing 23 of 23 projects
An open-source penetration testing framework for developing and executing exploit code against remote targets.
An open-source penetration testing framework for developing and executing exploit code against remote targets.
A Windows security tool for extracting credentials, hashes, and Kerberos tickets from memory and performing various post-exploitation techniques.
A CLI and library for evaluating, red-teaming, and comparing LLM prompts, agents, and RAGs with simple declarative configs.
A portable, extensible framework for network reconnaissance and MITM attacks on WiFi, BLE, HID, CAN-bus, IPv4, and IPv6 networks.
A PowerShell post-exploitation framework for penetration testers, providing modules for code execution, persistence, reconnaissance, and credential theft.
A penetration testing framework that exploits web browsers as beachheads for client-side attacks.
A PowerShell framework for offensive security, penetration testing, and red teaming with scripts for all phases.
A post-exploitation framework with PowerShell and Python agents for cryptographically secure communications and flexible modules.
A command-line tool for red-teaming and vulnerability scanning of large language models (LLMs).
An open-source adversary emulation platform that simulates malware attacks to test and improve network security defenses.
An automated cyber security platform for adversary emulation, red teaming, and incident response built on the MITRE ATT&CK framework.
A highly customizable USB attack platform for penetration testing, based on a Raspberry Pi Zero.
An OSINT tool that uses facial recognition to correlate social media profiles across multiple platforms for security professionals.
A DNS-based encrypted command-and-control (C&C) tunnel for secure communication and data exfiltration.
A weaponized PHP web shell for post-exploitation with over 30 modules for remote administration, auditing, and network pivoting.
A PowerShell toolkit for attacking, auditing, and securing Microsoft SQL Server environments during penetration tests.
A stealthy command and control framework that persists on webservers via a polymorphic PHP one-liner backdoor.
A modern, asynchronous, multiplayer command and control (C2) framework for post-exploitation using Python and .NET's DLR.
A deprecated collection of PowerShell tools for offensive security operations and penetration testing.
A collection of notes, scripts, and techniques for exploiting vulnerabilities and attacking Jenkins servers.
A Python RDP man-in-the-middle tool and library for intercepting, monitoring, and analyzing Remote Desktop Protocol connections.
A PowerShell runspace post-exploitation toolkit written in C# that bypasses security mitigations and includes offensive modules.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.