0x6rss / keklickLinks
Keklick - C2 Hunting, Reporting and Visualization Tool
β64Updated 5 months ago
Alternatives and similar repositories for keklick
Users that are interested in keklick are comparing it to the libraries listed below
Sorting:
- β53Updated 6 months ago
- Linux post exploitation tool for info gathering and exfiltration π§π‘πβ89Updated last month
- PoC that downloads an executable from a public SSL certificateβ135Updated 5 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious processβ73Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf filesβ95Updated 8 months ago
- C2 writen in Rust & Go powered by Tor network.β151Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's β¦β129Updated 9 months ago
- Enumerate active EDR's on the systemβ148Updated 3 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterβ110Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.β46Updated 8 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays β all in a single command (14 output formats supporteβ¦β207Updated 3 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated last year
- macos stealer pocβ133Updated 5 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysisβ78Updated last year
- Repo for all my exploits/PoCsβ53Updated 7 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.β86Updated 9 months ago
- Make an Linux Kernel rootkit visible again.β59Updated 10 months ago
- Configuration Extractors for Malwareβ121Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β82Updated last year
- Lena's scripts/code/resources for malware analysisβ26Updated last year
- Convert your shellcode into an ASCII stringβ124Updated 6 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ203Updated 9 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Recordβ44Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !β97Updated 3 weeks ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β112Updated 2 years ago
- Information stealer logs parserβ90Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflowsβ44Updated 7 months ago
- β37Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)β42Updated 10 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploitβ49Updated 11 months ago