0xGhazy / fateh-framework
Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.
☆14Updated 7 months ago
Alternatives and similar repositories for fateh-framework:
Users that are interested in fateh-framework are comparing it to the libraries listed below
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- A fully undetectable payload generator in python. working in 2021.☆16Updated last year
- Disable Windows Defender All Version☆31Updated 4 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 7 months ago
- ☆24Updated last year
- Cobalt strike CNA script to notify you via Discord whenever there is a new beacon.☆33Updated 2 years ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 3 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- AMSI Bypass for powershell☆30Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆16Updated 5 years ago
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆17Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆62Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆21Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- Create a malicious pip package (PoC)☆10Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆22Updated 2 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated 9 months ago