A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process , spawning a POWERSHELL on the attacker machine.
☆33May 28, 2019Updated 6 years ago
Alternatives and similar repositories for PersistentCReverseShell
Users that are interested in PersistentCReverseShell are comparing it to the libraries listed below
Sorting:
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20May 24, 2019Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Jun 4, 2019Updated 6 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- ☆15May 26, 2021Updated 4 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Oct 19, 2019Updated 6 years ago
- Download a payload and make it run from registry without droppng.☆110Apr 9, 2019Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆58Jun 23, 2023Updated 2 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- DO NOT RUN THIS.☆10Jul 15, 2021Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- ☆18Jul 4, 2019Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- A quick tool for hiding a new process running shellcode.☆57Jun 10, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Sep 28, 2019Updated 6 years ago
- A python Code to obfuscate any non-fud Powershell payload and generate a ready to use FUD Python executable script☆11May 18, 2020Updated 5 years ago
- A PoC executing shellcode in Dart☆17Jun 28, 2022Updated 3 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- ☆14Apr 16, 2022Updated 3 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- Shellcoding utilities☆225Dec 16, 2020Updated 5 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.☆34Dec 19, 2021Updated 4 years ago
- Sandbox evasion code snippets developped in Golang☆20Sep 19, 2022Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Apr 3, 2021Updated 4 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year