Cn33liz / JSMeterLinks
JavaScript Reversed TCP Meterpreter Stager
☆137Updated 8 years ago
Alternatives and similar repositories for JSMeter
Users that are interested in JSMeter are comparing it to the libraries listed below
Sorting:
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago
- VBS Reversed TCP Meterpreter Stager☆87Updated 8 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆150Updated 6 years ago
- ☆138Updated 7 years ago
- some pocs for antivirus evasion☆131Updated last year
- VBA Reversed TCP Meterpreter Stager☆62Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆91Updated 8 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆59Updated 8 years ago
- Cobalt Strike SCT payload obfuscator☆143Updated 7 years ago
- Port of eternal blue exploits to powershell☆150Updated 7 years ago
- The Outlook HTML Leak Test Project☆131Updated 7 years ago
- Liniaal - A communication extension to Ruler☆97Updated 6 years ago
- CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.☆176Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆119Updated 8 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆131Updated 3 months ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆210Updated 7 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆162Updated last year
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆147Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆76Updated 6 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 6 years ago
- ☆83Updated 9 years ago
- Yet another AV evasion tool☆119Updated 3 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆63Updated 2 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆215Updated 4 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆197Updated 7 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆62Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆119Updated 6 years ago
- ☆94Updated 6 years ago
- ☆58Updated 7 years ago