0d-gg / EfesLinks
Proof of concept demo for a tool that listens for keywords, and records audio to a file.
☆12Updated 8 years ago
Alternatives and similar repositories for Efes
Users that are interested in Efes are comparing it to the libraries listed below
Sorting:
- This is the linux version of the R.A.T client written in c#☆11Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆11Updated 4 years ago
- Small and highly portable detection tests.☆12Updated 7 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Apfell POC Chrome Extension Payload☆10Updated 5 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- ☆17Updated 6 years ago
- Random stuff☆16Updated 7 years ago
- Microsoft Windows HTA (HTML Application) - Remote Code Execution☆30Updated 9 years ago
- A simple reflective dll example☆19Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- Mimikatz HashClash☆12Updated 10 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆22Updated 7 years ago
- St0rn's exploits development (Web, Applicative, Network)☆7Updated 9 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- ☆24Updated 8 years ago
- Remote detection of a user's AV using Flash☆12Updated 9 years ago
- Automatically exported from code.google.com/p/hookme☆13Updated 9 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- ☆25Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Updated 5 years ago
- ☆16Updated 10 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆45Updated 2 years ago