Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).
☆14Apr 25, 2023Updated 2 years ago
Alternatives and similar repositories for nemo
Users that are interested in nemo are comparing it to the libraries listed below
Sorting:
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Add Spotify to your GitHub profile card.☆12Dec 29, 2021Updated 4 years ago
- ☆12Mar 27, 2024Updated last year
- ☆15Feb 9, 2022Updated 4 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆20Mar 21, 2024Updated last year
- ☆10Dec 4, 2020Updated 5 years ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 3 years ago
- A lua(u)-inspired implementation of signals/events in rust.☆16May 12, 2023Updated 2 years ago
- Defanger is a Notepad++ plugin that defangs/refangs malicious IOCs.☆25Jun 18, 2023Updated 2 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆25Dec 24, 2025Updated 2 months ago
- PhantomsGate: Advanced Shellcode Injection Technique☆26Jul 15, 2024Updated last year
- Registry hive parsing the async way☆25Oct 29, 2025Updated 4 months ago
- A cloud based remote android managment suite, powered by NodeJS☆28Dec 12, 2022Updated 3 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆51Jun 18, 2022Updated 3 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Jan 17, 2021Updated 5 years ago
- JsValidator is a tool created for validating the JS files after crawlling it from waybackurls☆18Mar 13, 2023Updated 2 years ago
- ☆23May 23, 2024Updated last year
- Swift, reliable, multi-language package manager. ✨🚤🚀✨☆26Jul 28, 2022Updated 3 years ago
- windows tiny reverse shell☆27Mar 21, 2022Updated 3 years ago
- ☆35Dec 21, 2023Updated 2 years ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆33Feb 2, 2026Updated 3 weeks ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆35Oct 31, 2023Updated 2 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Sep 4, 2023Updated 2 years ago
- AppXSVC Service race condition - privilege escalation☆30Jul 30, 2019Updated 6 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- JITK - JIT Killer is hooker for clrjit☆30Jan 3, 2023Updated 3 years ago
- Asynchronous RDP/VNC client for Python (GUI)☆75Jan 1, 2025Updated last year
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Use COM Component Bypass UAC,Dll Version☆36Apr 17, 2021Updated 4 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Sep 6, 2019Updated 6 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆73Jan 26, 2024Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆83Jan 12, 2023Updated 3 years ago