D3Ext / Vulkan
Offensive Powershell obfuscator
☆25Updated 7 months ago
Alternatives and similar repositories for Vulkan:
Users that are interested in Vulkan are comparing it to the libraries listed below
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆94Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 3 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- ☆17Updated 11 months ago
- ☆14Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- execute PE in memory Filelessly☆33Updated 2 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated 9 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- PowerShell Reverse Shell☆61Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆94Updated 3 years ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆112Updated 2 months ago
- ☆83Updated 3 months ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- ☆47Updated 3 years ago
- ☆80Updated 2 months ago
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- ☆58Updated 6 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆99Updated 5 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆88Updated last week
- ☆69Updated last year
- Chrome browser extension-based Command & Control☆117Updated 2 months ago