Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler.

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads.
For now it only supports windows/meterpreter & android/meterpreter

Getting Started

Please follow these instructions to get a copy of Kage running on your local machine without any problems.



About BloodHound

BloodHound uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use BloodHound to identify and eliminate those same attack paths. Both blue and red teams can use BloodHound to easily gain a deeper understanding of privilege relationships in an Active Directory environment.



Requires python3

usage: PyFuscation.py [-h] [-f] [-v] [-p] [–ps SCRIPT]

Optional arguments:

• -h, --help show this help message and exit
• -f    Obfuscate functions
	○ Do this First ... Its probably the most likely to work well
• -v    Obfuscate variables
	○ If your going to obfuscate variables do the parameters too. 
• -p    Obfuscate parameters
	○  If your going to obfuscate parameters do the variables too. 


Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive .NET tradecraft easier, and serve as a collaborative command and control platform for red teamers.

Covenant is an ASP.NET Core, cross-platform application that includes a web-based interface that allows for multi-user collaboration.


Welcome to 0x1.gitlab.io my personal blog to share my knowledge
Cyber Security, Ethical Hacking, Web & Network Auditing, Reverse Engineering and Cryptography
Website semi-configured to use with No-Script. No ADS and No use analytics tracking.


Forum : @0x1

© 0x1 | Cyber Security Consulting - Copyright All Rights Reserved