ELMERIKH / Darkshell
web based c2 š“āā ļø
ā12Updated 5 months ago
Alternatives and similar repositories for Darkshell:
Users that are interested in Darkshell are comparing it to the libraries listed below
- Payload Dropper with Persistance & Privesc & UAC bypass š±āš¤ā13Updated 9 months ago
- Trojan written in C++ for Windowsā14Updated 10 months ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat oā¦ā21Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interfaceā29Updated last year
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe componentā11Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.ā23Updated 6 months ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++ā¦ā15Updated last year
- ā11Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.ā16Updated 9 months ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.ā14Updated 5 months ago
- Some good things for EXP-301 courseā11Updated last year
- Parent Process ID Spoofing, coded in CGo.ā22Updated 6 months ago
- Rust Weaponization for Red Team Engagements.ā11Updated 2 years ago
- Yet, Another Packer/Loaderā25Updated last year
- Deobfuscation of XorStringsNetā12Updated 2 months ago
- ā21Updated last year
- ā10Updated 2 months ago
- Exploit for elevation of privilege vulnerability in QuickHeal's Seqrite EPS (CVE-2023-31497).ā18Updated last year
- ā13Updated 7 months ago
- Beacon Object Files used for Cobalt Strikeā17Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.ā20Updated 3 years ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.ā25Updated 6 months ago
- ā26Updated last year
- Remote Template Injection Toolkitā29Updated 9 months ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploitā11Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. Pā¦ā15Updated 3 years ago
- Tool for obtaining information about PPL processesā17Updated 11 months ago
- ā13Updated last year
- š Python Exploit for CVE-2022-23935ā13Updated last year