manjusaka
牛屎花 一款基于WEB界面的远程主机管理工具 (by YDHCUI)
geacon
Practice Go programming and implement CobaltStrike's Beacon in Go (by darkr4y)
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
manjusaka
Posts with mentions or reviews of manjusaka.
We have used some of these posts to build our list of alternatives
and similar projects.
-
Manjusaka: A Chinese sibling of Sliver and Cobalt Strike
Is this it? https://github.com/YDHCUI/manjusaka
geacon
Posts with mentions or reviews of geacon.
We have used some of these posts to build our list of alternatives
and similar projects.
What are some alternatives?
When comparing manjusaka and geacon you can also consider the following projects:
RIP - Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
go-whatsapp - WhatsApp Web API
traefik - The Cloud Native Application Proxy
go - The Go programming language
blackCatConf - Configuration Extractor for BlackCat Ransomware
terracognita - Reads from existing public and private cloud providers (reverse Terraform) and generates your infrastructure as code on Terraform configuration
ipv4guard - A Cobalt Strike Aggressor Script that aims to help prevent errant Cobalt Strike commands from being executed on non-whitelisted / off-target / out-of-scope / unapproved IPv4 addresses.