ELMERIKH / KeresView external linksLinks
Persistent Powershell backdoor tool {π}
β122Jul 31, 2024Updated last year
Alternatives and similar repositories for Keres
Users that are interested in Keres are comparing it to the libraries listed below
Sorting:
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β14Apr 8, 2024Updated last year
- web based c2 π΄ββ οΈβ15Aug 10, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β36Nov 16, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"β14Dec 8, 2023Updated 2 years ago
- Volatility 3 plugins to extract a module as complete as possibleβ12Jun 13, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Dec 20, 2023Updated 2 years ago
- A PowerShell script that simplifies life and therefore... phishing.β20Aug 16, 2022Updated 3 years ago
- Reverse shell that can bypass windows defender detectionβ169Feb 3, 2024Updated 2 years ago
- β35Dec 21, 2023Updated 2 years ago
- β59Dec 15, 2023Updated 2 years ago
- β106Sep 12, 2024Updated last year
- Monarch - The Adversary Emulation Toolkitβ63Jan 7, 2025Updated last year
- Generate Shellcode Loaders & Injectsβ159May 15, 2023Updated 2 years ago
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.β46Oct 26, 2025Updated 3 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gatheringβ‘.β60Nov 22, 2024Updated last year
- Command and Control (C2) frameworkβ132May 16, 2025Updated 8 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direcβ¦β440Oct 1, 2025Updated 4 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β66Mar 6, 2024Updated last year
- AI web vulneraribilty scanner π€β21Feb 22, 2024Updated last year
- Postfix SMTP Smuggling - Expect Script POCβ22Dec 26, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ72Oct 28, 2023Updated 2 years ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.β82Sep 13, 2024Updated last year
- A utility that can be used to launch an executable with a DLL injectedβ19Nov 20, 2023Updated 2 years ago
- This repository implements Threadless Injection in Cβ172Dec 23, 2023Updated 2 years ago
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.β45Sep 22, 2023Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Jan 22, 2024Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β86Feb 22, 2025Updated 11 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboardβ13Mar 11, 2025Updated 11 months ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerShβ¦β13Jun 2, 2024Updated last year
- Only for educational purposesβ12Jun 17, 2023Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.β45Mar 8, 2024Updated last year
- CVE-2023-7028β59Jan 12, 2024Updated 2 years ago
- Trojan written in C++ for Windowsβ20Mar 12, 2024Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ70Feb 3, 2024Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.β25Nov 2, 2025Updated 3 months ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ224Nov 23, 2023Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ51Oct 12, 2024Updated last year
- Creation and removal of Defender path exclusions and exceptions in C#.β32Nov 1, 2023Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as Aβ¦β300Feb 2, 2026Updated last week