3xploit666 / Shell-CustomLinks
this is a simple shell that has the ability to bypass defenses
☆13Updated last year
Alternatives and similar repositories for Shell-Custom
Users that are interested in Shell-Custom are comparing it to the libraries listed below
Sorting:
- Bypass Constrained Language Mode in PowerShell☆30Updated 6 years ago
- This repo hosts a poc of how to execute F# code within an unmanaged process☆68Updated last year
- Perform Windows domain enumeration via LDAP☆36Updated 3 years ago
- This is a CS project that will encrypt shell code from msfvenom using AES☆22Updated 3 years ago
- A cheatsheet and mindmap for CRTO certification☆10Updated 2 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Updated 4 years ago
- airCross is a tool that takes advantage of API functionality within VMWare's AirWatch MDM solution to perform single-factor authenticatio…☆48Updated 3 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆74Updated 3 months ago
- PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10…☆35Updated 2 years ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Updated 3 years ago
- RDP Checker☆63Updated last year
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- Modified version of PEAS client for offensive operations☆41Updated 2 years ago
- pypykatz plugin for volatility3 framework☆41Updated 2 months ago
- Federated Office365 user enumeration based on correlated response trend analysis☆51Updated 3 years ago
- Quick Start/Setup of CI/CD for Offensive/Defensive Purposes☆19Updated 3 years ago
- ☆39Updated last year
- WMI SA stuffs☆30Updated 3 years ago
- Right-To-Left Override POC☆35Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆24Updated 3 years ago
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆26Updated 3 years ago
- Golang search engine scraper intended for identification of published ClickOnce deployments☆81Updated 8 months ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Updated 2 years ago
- ☆48Updated last year
- ☆19Updated 3 years ago
- ☆13Updated 4 years ago
- Microsoft365 Device Code Phishing Framework☆37Updated 3 years ago