Caprico1 / kinsingLinks
Docker kinsing malware bitcoin/xmr miner
☆23Updated 4 years ago
Alternatives and similar repositories for kinsing
Users that are interested in kinsing are comparing it to the libraries listed below
Sorting:
- The best way to send emails in Go.☆10Updated 4 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- PoC Remote Administration Tool☆11Updated 5 years ago
- Simple utility to manage multiple ssh☆15Updated 2 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Shellcode process injector☆27Updated 5 years ago
- Machine Learning basics with phishing dataset☆11Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Red Team C2 and Post Exploitation code☆36Updated last week
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆67Updated 5 years ago
- ☆17Updated 6 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆18Updated 4 years ago
- React UI☆11Updated 2 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15Updated 2 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 6 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- Easily-guessable Password Generator for Password Spray Attack☆21Updated 5 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- Some Pentesting Scripts☆11Updated 3 years ago