D3Ext / Vulkan
Offensive Powershell obfuscator
☆27Updated 8 months ago
Alternatives and similar repositories for Vulkan
Users that are interested in Vulkan are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- Inject RDPThief into memory with PowerShell.☆63Updated 3 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆51Updated 4 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- ☆18Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- ☆85Updated 3 months ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆44Updated last year
- A script to automate keystrokes through a graphical desktop program.☆35Updated 3 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆62Updated 2 weeks ago
- ☆14Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆115Updated 3 months ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆28Updated 2 years ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆103Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 7 months ago
- ☆56Updated 6 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Sol…☆93Updated last month
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Updated last year