Ashen-MG / Malware-ReverseShell
Python reverse shell malware.
☆10Updated 2 years ago
Alternatives and similar repositories for Malware-ReverseShell:
Users that are interested in Malware-ReverseShell are comparing it to the libraries listed below
- Automated encryption utilities and installation☆12Updated 4 years ago
- with encryption, file reading, screenshots and email sending☆10Updated 8 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Reverse shell using socket programming in python☆15Updated 2 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆10Updated 5 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- Repository of tools used in my blog☆51Updated last year
- module for certexfil☆15Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆12Updated 4 months ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆25Updated 6 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆15Updated 5 years ago
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934☆8Updated 3 years ago
- TaskMgr Volatile Environment LPE☆13Updated 4 months ago
- Python tool to analyze PE file for patterns used by malware☆23Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Nexus of Android banking Trojans☆15Updated last year
- Information Stealers Wall of Sheep (IS-WOS)☆12Updated 4 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Malware USB Spread | POC | Example☆8Updated 6 years ago
- An advanced Ransomware with CryptoGraphy and all the stuff.☆7Updated 4 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Pentest ToolKit☆28Updated 5 years ago
- Display Languages Volatile Environment LPE☆10Updated 4 months ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago