ELMERIKH / KeresLinks
Persistent Powershell backdoor tool {π}
β119Updated last year
Alternatives and similar repositories for Keres
Users that are interested in Keres are comparing it to the libraries listed below
Sorting:
- Reverse shell that can bypass windows defender detectionβ166Updated last year
- PDF dropper Red Team Scenairosβ216Updated last year
- PowerShell Obfuscatorβ181Updated last year
- β105Updated 10 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eacβ¦β56Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shellβ101Updated last year
- EDR & Antivirus Bypass to Gain Shell Accessβ245Updated 10 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β251Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β123Updated 2 years ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ154Updated last year
- Dark-Shell is a Tool for Generating ReverShell Fileβ114Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β110Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterβ106Updated last year
- Generate FUD backdoorsβ249Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversionsβ69Updated 3 months ago
- β21Updated last year
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ163Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β78Updated 10 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β409Updated last month
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !β71Updated last month
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β149Updated last year
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtubeβ91Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , β¦β28Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniquesβ136Updated last year
- A C2 framework built for my bachelors thesisβ55Updated 9 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β136Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β87Updated last year