Caprico1 / kinsingLinks
Docker kinsing malware bitcoin/xmr miner
☆23Updated 4 years ago
Alternatives and similar repositories for kinsing
Users that are interested in kinsing are comparing it to the libraries listed below
Sorting:
- Red Team C2 and Post Exploitation code☆36Updated 5 months ago
- The best way to send emails in Go.☆11Updated 4 years ago
- A Linux RAT in C☆34Updated 7 years ago
- Shellcode process injector☆28Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- Rosie the Pivoter☆17Updated 7 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- ☆17Updated 7 years ago
- ☆33Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail or…☆19Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- ☆12Updated 2 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 4 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Handy script to automate the attack☆22Updated 5 years ago
- A reverse socks5 proxy server and client☆18Updated 8 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆25Updated 3 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Updated last year
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- Network Finger Printer☆16Updated 8 years ago
- Simple golang reverse shell☆20Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Updated 5 years ago