Ashen-MG / Malware-ReverseShellLinks
Python reverse shell malware.
☆10Updated 3 years ago
Alternatives and similar repositories for Malware-ReverseShell
Users that are interested in Malware-ReverseShell are comparing it to the libraries listed below
Sorting:
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Repository of tools used in my blog☆51Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 6 years ago
- 10000% FUD rat generator☆9Updated 2 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Reverse shell using socket programming in python☆15Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Download payload to disk and install it to startup then melt.☆36Updated 6 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- AES Ransomware in batch☆11Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Simple class to search and upload files☆28Updated 5 years ago
- TaskMgr Volatile Environment LPE☆13Updated 7 months ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆17Updated 3 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- A privilege escalation exploit in the Steam Client☆13Updated 5 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆9Updated 7 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 3 years ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- Javascript Botnet☆23Updated 6 years ago