1captainnemo1 / ReverseshellcppLinks
A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting back to the attacker machine as a silent background process.
☆20Updated 6 years ago
Alternatives and similar repositories for Reverseshellcpp
Users that are interested in Reverseshellcpp are comparing it to the libraries listed below
Sorting:
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 5 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Updated 6 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 6 years ago
- Download and loader .NET payload☆37Updated 6 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- medium-rare☆28Updated 5 years ago
- Windows Antivirus Evasion and Memory Injection☆12Updated 3 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Botnet SDK Based on Zeus HTTP Malware (Educational Purposes)☆17Updated 6 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆14Updated 2 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- ☆40Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Windows Local Privilege Escalation - 0 Day Vulnerability (schtasks.exe) released by @SandboxEscaper :)☆16Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069☆37Updated 6 years ago
- ☆14Updated 6 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆24Updated 7 years ago
- inject and run code into arbitrary process (x86 and x64)☆13Updated 4 years ago
- Passwordless RDP Session Hijacking☆69Updated 4 years ago
- Raw syscall implementations with Powershell☆29Updated 6 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆18Updated 2 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 4 years ago
- Loader and RunPE file executer☆18Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 7 years ago