0xor0ne / recmdLinks
Remote Command executor
☆82Updated 2 years ago
Alternatives and similar repositories for recmd
Users that are interested in recmd are comparing it to the libraries listed below
Sorting:
- Quick network scanner library. https://crates.io/crates/qscan☆91Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- Basic reverse shell in C using socket() with complete explanation☆68Updated 2 years ago
- Windows And Ways To Break It☆100Updated 2 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Create and enumerate hidden desktops.☆88Updated 2 years ago
- Rust Weaponization for Red Team Engagements.☆28Updated 3 years ago
- DNS over HTTPS targeted malware (only runs once)☆96Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆161Updated last year
- ☆143Updated last month
- Linux Enumeration / Privilege escalation tool☆26Updated 5 years ago
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆54Updated 2 years ago
- A collection of PoCs for different injection techniques on Windows!☆49Updated 2 years ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆35Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated 2 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated 2 years ago
- ☆132Updated 2 years ago
- Bypass Malware Sandbox Evasion Ram check☆141Updated 3 years ago
- ☆85Updated 3 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- ☆63Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- LD_PRELOAD rootkit☆137Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆88Updated last month
- Exploit for the CVE-2023-23397☆160Updated 2 years ago
- ☆107Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated 2 years ago
- random code snippets, useful for getting started☆123Updated last month