0x00-0x00 / TelePreterLinks
Telegram-based PowerShell Runspace Host
☆11Updated 3 years ago
Alternatives and similar repositories for TelePreter
Users that are interested in TelePreter are comparing it to the libraries listed below
Sorting:
- ☆17Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- C# Situational Awareness Script☆34Updated 6 years ago
- ☆11Updated 6 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- ☆14Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Updated 6 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- CVE-2019-12949☆26Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- PoC ActiveX SVG Document Execution☆21Updated 7 years ago
- My Shellcode Archive☆29Updated 8 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- A set of compiled application restriction bypasses☆30Updated 8 years ago
- ☆33Updated 10 years ago
- ☆25Updated 7 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Updated 7 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆54Updated last year
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- ☆21Updated 6 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 6 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Updated 7 years ago
- This repository contains some details about abusing outlook.☆27Updated 7 years ago