Caprico1 / kinsingLinks
Docker kinsing malware bitcoin/xmr miner
☆23Updated 4 years ago
Alternatives and similar repositories for kinsing
Users that are interested in kinsing are comparing it to the libraries listed below
Sorting:
- The best way to send emails in Go.☆10Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A Linux RAT in C☆34Updated 6 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Emulate the handshake packets of an RDP server with python☆15Updated 7 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆33Updated 3 weeks ago
- pentest toolbox☆28Updated 2 years ago
- ☆17Updated 6 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- Shellcode process injector☆28Updated 5 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆25Updated 5 years ago
- Provides access to libhashcat☆30Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Monitor malware scanning services for your payloads☆11Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago