1captainnemo1 / ReverseshellcppLinks
A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process.
☆20Updated 6 years ago
Alternatives and similar repositories for Reverseshellcpp
Users that are interested in Reverseshellcpp are comparing it to the libraries listed below
Sorting:
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆1Updated 3 years ago
- Download and loader .NET payload☆37Updated 5 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 5 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 5 years ago
- Ring 3 Rootkit DLL☆8Updated 7 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆38Updated 5 years ago
- ☆41Updated 7 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆36Updated 6 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆15Updated 6 years ago
- inject and run code into arbitrary process (x86 and x64)☆13Updated 3 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- medium-rare☆28Updated 5 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- Raw syscall implementations with Powershell☆29Updated 5 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆58Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- ☆14Updated 5 years ago
- Download a .NET payload and run it on memory☆71Updated 6 years ago
- The Hunt for Malicious Strings☆13Updated 4 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Updated 3 weeks ago