D3Ext / VulkanLinks
Offensive Powershell obfuscator
☆27Updated last year
Alternatives and similar repositories for Vulkan
Users that are interested in Vulkan are comparing it to the libraries listed below
Sorting:
- ☆25Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- A C2 framework built for my bachelors thesis☆56Updated 2 weeks ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆174Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆102Updated last month
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- ☆15Updated 2 years ago
- ☆106Updated last year
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆34Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- A sophisticated PowerShell script that stealthily injects Base64-encoded shellcode into the target process, featuring anti-debugging tech…☆23Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆109Updated 4 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- ☆106Updated 11 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 9 months ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆51Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year