Caprico1 / kinsingLinks
Docker kinsing malware bitcoin/xmr miner
☆23Updated 4 years ago
Alternatives and similar repositories for kinsing
Users that are interested in kinsing are comparing it to the libraries listed below
Sorting:
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Shellcode process injector☆28Updated 5 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- The best way to send emails in Go.☆12Updated 4 years ago
- Red Team C2 and Post Exploitation code☆34Updated 5 months ago
- ☆17Updated 7 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆63Updated 7 years ago
- A Linux RAT in C☆33Updated 7 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Handy script to automate the attack☆22Updated 6 years ago
- Free Email Providers☆11Updated 2 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- ☆33Updated 5 years ago
- VNC pentest tool with bruteforce and ducky script execution features☆23Updated 8 years ago
- Simple golang reverse shell☆20Updated 5 years ago
- A golang library designed to interact with Metasploit☆43Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Modular rootkit framework.☆30Updated 4 years ago
- Work in Progress repo☆15Updated 6 years ago
- Network Finger Printer☆16Updated 8 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago