Blazz3 / MalDev-AV-EDR-Evasion-for-PentestersLinks
MalDev & AV-EDR Evasion for Pentesters
☆20Updated 2 years ago
Alternatives and similar repositories for MalDev-AV-EDR-Evasion-for-Pentesters
Users that are interested in MalDev-AV-EDR-Evasion-for-Pentesters are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆56Updated 2 weeks ago
- ☆95Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- A small red team course☆40Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago
- ☆58Updated 7 months ago
- ☆59Updated last year
- Modules for my C2 course students to use for their own projects.☆74Updated 2 years ago
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62Updated last year
- ☆106Updated 11 months ago
- Cobalt Strike BOFS☆16Updated 2 years ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆102Updated last month
- A collection of PoCs for different injection techniques on Windows!☆49Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- This function combines all the above functions and takes necessary information from the user to change the IP and MAC address, start the …☆73Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆75Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆31Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated last year
- ☆37Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆35Updated 2 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Tool for enumerating Active Directory environments☆48Updated 2 years ago
- ☆35Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year