0xor0ne / recmdLinks
Remote Command executor
☆80Updated 2 years ago
Alternatives and similar repositories for recmd
Users that are interested in recmd are comparing it to the libraries listed below
Sorting:
- Quick network scanner library. https://crates.io/crates/qscan☆88Updated 2 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆45Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated 11 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- DNS over HTTPS targeted malware (only runs once)☆95Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Rust bindings to Microsoft Windows users / groups management API☆34Updated last year
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- Windows And Ways To Break It☆99Updated 2 years ago
- ☆39Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 3 months ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- C2 Automation using Linode☆85Updated 3 years ago
- udpy_proto_scanner is a Python script which discovers UDP services by sending triggers to a list of hosts☆46Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated last year
- A Repository to Track Anti-Forensic Techniques☆113Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆159Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- ☆132Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 8 months ago
- ☆84Updated 3 years ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆86Updated last year
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- random code snippets, useful for getting started☆121Updated 11 months ago
- Exploit for the CVE-2023-23397☆160Updated 2 years ago