ELMERIKH / Keres
Persistent Powershell backdoor tool {π}
β116Updated 7 months ago
Alternatives and similar repositories for Keres:
Users that are interested in Keres are comparing it to the libraries listed below
- Reverse shell that can bypass windows defender detectionβ161Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ115Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- β103Updated 6 months ago
- PowerShell Obfuscatorβ115Updated 9 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterβ93Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated 10 months ago
- β61Updated 10 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β246Updated last year
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ162Updated last year
- PDF dropper Red Team Scenairosβ197Updated 7 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eacβ¦β48Updated 2 months ago
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β142Updated 9 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ159Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β108Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.β125Updated 2 weeks ago
- γπγProof of concept on BYOVD attackβ155Updated 3 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β105Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ134Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β75Updated 6 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- Continuous password spraying toolβ174Updated 3 weeks ago
- A C2 framework built for my bachelors thesisβ55Updated 4 months ago
- Auto exploitation tool for CVE-2024-24401.β33Updated 6 months ago
- Dumping lsass without mimikatz with the exfiltration of the data using FAKE ntp packetsβ79Updated this week
- Our Tips&Tricksβ111Updated last month
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms Fileβ174Updated this week
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575β86Updated 4 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)β172Updated last year