Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.
☆10Mar 10, 2026Updated last month
Alternatives and similar repositories for fateh-framework
Users that are interested in fateh-framework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15May 26, 2021Updated 4 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆21Nov 29, 2024Updated last year
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Service for management of hosts where is present a malware developed using Richkware framework.☆18Feb 5, 2026Updated 2 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆97Jul 26, 2021Updated 4 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Nov 22, 2025Updated 4 months ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- go语言实现钓鱼抓取微信信息,搜索微信AccInfo.dat文件,从中正则匹配出当前微信名,手机号,邮箱,地区等信息,发送到cobaltstrike服务器。☆54May 28, 2022Updated 3 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- A simple and scalable Android bot emulation framework, as presented at Black Hat Europe 2021's Arsenal, as well as atHack 2021's Arsenal☆28Nov 8, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- 通过使用Fofa,钟馗之眼,Shodan进行数据采集☆25Apr 15, 2021Updated 5 years ago
- written to increase website visits and in case of excessive use of it, the website will be blacklisted by Google.☆22Jul 19, 2023Updated 2 years ago
- A python script for easy static analysis and automatic signature generation of malware.☆12Sep 30, 2013Updated 12 years ago
- Escalation of privilege exploit for Dell BIOS flasher (Flash64W) (2017)☆13Dec 7, 2020Updated 5 years ago
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- The poc for CVE-2022-26809 RCE via RPC will be updated here.☆20Apr 18, 2022Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆22May 15, 2022Updated 3 years ago
- Zyxel 防火墙远程命令注入漏洞(CVE-2022-30525)☆22May 13, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Linux and windows privilege escalation cheatsheet☆11May 18, 2023Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Aug 18, 2021Updated 4 years ago
- Moobot Botnet | Leaked version☆18Jan 11, 2021Updated 5 years ago
- Curated list of enterprise ransomware defense resources☆14Apr 8, 2022Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆12Jun 7, 2021Updated 4 years ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago