DakotaNelson / sneaky-creeperView external linksLinks
Get your APT on using social media as a tool for data exfiltration.
☆149Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for sneaky-creeper
Users that are interested in sneaky-creeper are comparing it to the libraries listed below
Sorting:
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- A proof of concept demonstrating the use of Google Drive for command and control.☆87Jul 19, 2018Updated 7 years ago
- Black Hills Info Sec has a great tool on Byt3Bl33d3rs github utilizing Gmail as C2 tansport. Using that Idea I wanted something that did…☆12May 16, 2016Updated 9 years ago
- Pazuzu: Reflective DLL to run binaries from memory☆214Aug 4, 2020Updated 5 years ago
- ☆425Aug 29, 2017Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Spray SMB with hashes, Then psexec☆32Jul 3, 2019Updated 6 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 9 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆409Jul 14, 2016Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆299Dec 21, 2017Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆300May 5, 2016Updated 9 years ago
- ☆21May 14, 2017Updated 8 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Nov 3, 2017Updated 8 years ago
- ☆57May 13, 2020Updated 5 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- ☆110May 14, 2018Updated 7 years ago
- A PoC backdoor that uses Gmail as a C&C server☆1,346Nov 16, 2018Updated 7 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Jun 27, 2019Updated 6 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 3 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Oct 6, 2017Updated 8 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Credential and Red Teaming Defense for Windows Environments☆330Jul 17, 2024Updated last year
- CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based S…☆1,648Nov 24, 2020Updated 5 years ago
- spectrum monitoring system for GSM providers☆44Jan 10, 2016Updated 10 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Nov 19, 2017Updated 8 years ago
- Source code to the Malicious Demon Hunter Exploit Kit☆58Jun 26, 2015Updated 10 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- CVE-2016-1287 vulnerability test☆16Feb 15, 2016Updated 10 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- RedSails is a Python based post-exploitation project aimed at bypassing host based security monitoring and logging. DerbyCon 2017 Talk: h…☆307Oct 18, 2017Updated 8 years ago