0xor0ne / recmdLinks
Remote Command executor
☆77Updated 2 years ago
Alternatives and similar repositories for recmd
Users that are interested in recmd are comparing it to the libraries listed below
Sorting:
- Quick network scanner library. https://crates.io/crates/qscan☆86Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Rust in-memory dumper☆108Updated last year
- Cheat sheet to detect and remove linux kernel rootkit☆67Updated 7 months ago
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- ☆38Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆130Updated 8 months ago
- Linux Enumeration / Privilege escalation tool☆23Updated 4 years ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- ☆59Updated last year
- Make an Linux Kernel rootkit visible again.☆53Updated 4 months ago
- random code snippets, useful for getting started☆121Updated 8 months ago
- ☆85Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆65Updated 2 years ago
- ☆107Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Windows And Ways To Break It☆100Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆84Updated this week
- ☆128Updated 3 months ago
- ☆45Updated 2 years ago
- A collection of source code, binaries, and compilation scripts designed to bypass detection☆25Updated 2 years ago
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆96Updated 9 months ago
- A Repository to Track Anti-Forensic Techniques☆110Updated 2 years ago
- Command and Control (C2) framework☆127Updated 2 months ago
- A collection of PoCs for different injection techniques on Windows!☆44Updated last year
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆157Updated last year
- Get root via TTY / TIOCSTI stuffing☆76Updated 2 months ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- ☆42Updated 2 years ago