Caprico1 / kinsingLinks
Docker kinsing malware bitcoin/xmr miner
☆23Updated 4 years ago
Alternatives and similar repositories for kinsing
Users that are interested in kinsing are comparing it to the libraries listed below
Sorting:
- A Linux RAT in C☆35Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago
- Red Team C2 and Post Exploitation code☆36Updated 3 months ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- ☆17Updated 7 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 5 years ago
- Shellcode process injector☆28Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Simple golang reverse shell☆21Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A reverse socks5 proxy server and client☆18Updated 7 years ago
- Simple C2 over the Trello API☆39Updated 2 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Free Email Providers☆11Updated 2 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- ☆50Updated 5 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- pentest toolbox☆28Updated 3 years ago