3xploit666 / Shell-Custom
this is a simple shell that has the ability to bypass defenses
☆13Updated 10 months ago
Alternatives and similar repositories for Shell-Custom:
Users that are interested in Shell-Custom are comparing it to the libraries listed below
- Extra cmdlets to help with quering security related information from Azure☆13Updated 6 months ago
- ☆22Updated 3 years ago
- Traditional AD RedTeam Full Enumeration Script used to query all aspects of your target Forest.☆43Updated 9 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- Windows Post-Exploitation tools wrapper☆12Updated 9 months ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- ☆12Updated 3 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 3 years ago
- This repo will contain some basic pentest/RT commands.☆37Updated 2 years ago
- Automation of Active Directory penetration testing tasks on top of BloodHound CE☆34Updated last year
- ☆19Updated last year
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆18Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆31Updated 2 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Utilities for obfuscating shellcode☆57Updated 2 weeks ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆42Updated this week
- Slide decks and/or materials from conference presentations☆56Updated 2 years ago
- ☆37Updated 11 months ago
- Bypass Constrained Language Mode in PowerShell☆27Updated 5 years ago
- A module for CME that spiders across a domain.☆35Updated 2 years ago
- Simple AV Evasion for PE Files☆42Updated 3 years ago
- ☆47Updated 2 years ago
- A collection of Terraform projects, Ansible playbooks, and roles designed to build a Red Team infrastructure.☆16Updated last month
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Updated 9 months ago
- ☆62Updated 2 weeks ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆31Updated last year
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆24Updated 4 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year
- A PoC weaponising CustomXMLPart for hiding malware code inside of Office document structures.☆36Updated 2 years ago