DarkCoderSc / SubSevenLinks
SubSeven Legacy Official Source Code Repository
☆634Updated 2 years ago
Alternatives and similar repositories for SubSeven
Users that are interested in SubSeven are comparing it to the libraries listed below
Sorting:
- During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target…☆738Updated 2 weeks ago
- Simple & Powerful PowerShell Script Obfuscator☆584Updated 5 months ago
- Sandman is a NTP based backdoor for hardened networks.☆810Updated last year
- zerosum0x0's Koadic☆318Updated 3 years ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- ☆511Updated last year
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,036Updated last year
- Pentester's Promiscuous Notebook☆519Updated 3 weeks ago
- A light-weight first-stage C2 implant written in Nim (and Rust).☆921Updated 7 months ago
- A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compil…☆1,110Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆806Updated 7 months ago
- Collection of various malicious functionality to aid in malware development☆1,776Updated last year
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,007Updated 3 weeks ago
- PowerShell Ransomware Simulator with C2 Server☆492Updated last year
- Original PoC for CVE-2023-32784☆643Updated 2 years ago
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆552Updated 4 years ago
- evasion technique to defeat and divert detection and prevention of security products (AV/EDR/XDR)☆1,493Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆315Updated last year
- PasteBomb C2-less RAT☆318Updated 3 weeks ago
- ☆353Updated 2 years ago
- GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet or Microsof…☆631Updated 7 months ago
- Reproducing Spyboy technique to terminate all EDR/XDR/AVs processes☆1,029Updated 2 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Updated last year
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,195Updated 2 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆393Updated 2 years ago
- Killer is a super simple tool designed to bypass AV/EDR security tools using various evasive techniques.☆831Updated last year
- HTML smuggling is not an evil, it can be useful☆384Updated last year
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆489Updated 2 weeks ago
- Research code & papers from members of vx-underground.☆1,314Updated 3 years ago
- Gets updates from various clearnet domains and ransomware threat actor domains☆405Updated last year