D3Ext / Vulkan
Offensive Powershell obfuscator
☆25Updated 6 months ago
Alternatives and similar repositories for Vulkan:
Users that are interested in Vulkan are comparing it to the libraries listed below
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 4 months ago
- ☆16Updated 11 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆59Updated 8 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 7 months ago
- ☆14Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆48Updated 2 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- PowerShell script to generate ShellCode in various formats☆42Updated 6 months ago
- Inject RDPThief into memory with PowerShell.☆61Updated 2 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 10 months ago
- Malicious powershell scripts loader designed to avoid detection.☆49Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆64Updated 9 months ago
- ☆79Updated last month
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- A collection of Cobalt Strike Aggressor scripts.☆92Updated 3 years ago
- ☆63Updated 11 months ago
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packets☆79Updated this week
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆45Updated 2 weeks ago
- ☆83Updated 2 months ago
- Command and Control (C2) framework☆126Updated 11 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆111Updated last week
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆101Updated 2 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆111Updated 2 months ago