0xor0ne / recmdLinks
Remote Command executor
☆78Updated 2 years ago
Alternatives and similar repositories for recmd
Users that are interested in recmd are comparing it to the libraries listed below
Sorting:
- Quick network scanner library. https://crates.io/crates/qscan☆86Updated 2 years ago
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- ☆59Updated last year
- A collection of PoCs for different injection techniques on Windows!☆45Updated 2 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆131Updated 10 months ago
- Simple Secure Static (HTTPS) File Server with embedded certificate☆46Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆25Updated 5 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- DNS over HTTPS targeted malware (only runs once)☆97Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- ☆135Updated last month
- ☆38Updated 2 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated 2 years ago
- Windows And Ways To Break It☆99Updated last year
- Hacking Windows through iTunes - Local Privilege Escalation 0-day☆98Updated 11 months ago
- ☆84Updated 3 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Updated last year
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆158Updated last year
- random code snippets, useful for getting started☆121Updated 10 months ago
- Rust in-memory dumper☆108Updated 2 years ago
- POC for DLL Proxying / Hijacking☆62Updated 3 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated 2 months ago
- C2 Automation using Linode☆84Updated 2 years ago
- Hide memory artifacts using ROP and hardware breakpoints.☆148Updated last year
- Resources, scripts, and overviews of the knowledge I collect going through Offensive Security's macOS Exploit Development course.☆46Updated 3 years ago
- Windows internals and exploitation tricks☆105Updated 3 months ago
- ROPDump is a command-line tool designed to analyze binary executables for potential Return-Oriented Programming (ROP) gadgets, buffer ove…☆86Updated last year
- ☆108Updated 2 years ago