BlWasp / rs-shellLinks
A dirty PoC for a reverse shell with cool features in Rust
☆184Updated last year
Alternatives and similar repositories for rs-shell
Users that are interested in rs-shell are comparing it to the libraries listed below
Sorting:
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆158Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆193Updated last year
- yet another AV killer tool using BYOVD☆297Updated last year
- Nameless C2 - A C2 with all its components written in Rust☆274Updated 11 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆237Updated 8 months ago
- AV bypass while you sip your Chai!☆224Updated last year
- ☆182Updated 3 months ago
- A Rust implementation of Internal-Monologue — retrieving NetNTLM hashes without touching LSASS, leveraging SSPI for NTLM negotiation and …☆168Updated 4 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆141Updated last month
- ☆170Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Evasive Golang Loader☆135Updated last year
- Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.☆172Updated 6 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆258Updated last year
- Collection of random RedTeam scripts.☆208Updated last year
- psexecsvc - a python implementation of PSExec's native service implementation☆217Updated 7 months ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆208Updated last year
- Tool designed to find folder exclusions using Windows Defender using command line utility MpCmdRun.exe as a low privileged user, without …☆215Updated 11 months ago
- Chrome browser extension-based Command & Control☆173Updated 2 months ago
- Lateral Movement via Bitlocker DCOM interfaces & COM Hijacking☆342Updated 2 months ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆207Updated 11 months ago
- ☆164Updated last year
- 「💀」Proof of concept on BYOVD attack☆163Updated 9 months ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆259Updated last year
- Attempt at Obfuscated version of SharpCollection☆221Updated 2 weeks ago
- Different methods to get current username without using whoami☆178Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆108Updated 3 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆142Updated 8 months ago
- ☆287Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year