Persistent Powershell backdoor tool {π}
β121Jul 31, 2024Updated last year
Alternatives and similar repositories for Keres
Users that are interested in Keres are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Payload Dropper with Persistance & Privesc & UAC bypass π±βπ€β14Apr 8, 2024Updated last year
- web based c2 π΄ββ οΈβ15Aug 10, 2024Updated last year
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"β14Dec 8, 2023Updated 2 years ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion π·β87Feb 22, 2025Updated last year
- AI web vulneraribilty scanner π€β20Feb 22, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.β37Nov 16, 2023Updated 2 years ago
- Reverse shell that can bypass windows defender detectionβ172Feb 3, 2024Updated 2 years ago
- β59Dec 15, 2023Updated 2 years ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)β83Dec 20, 2023Updated 2 years ago
- β35Dec 21, 2023Updated 2 years ago
- β106Sep 12, 2024Updated last year
- Generate Shellcode Loaders & Injectsβ159May 15, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantationβ73Oct 28, 2023Updated 2 years ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gatheringβ‘.β61Nov 22, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways β’ AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hashβ51Oct 12, 2024Updated last year
- A PowerShell script that simplifies life and therefore... phishing.β20Aug 16, 2022Updated 3 years ago
- Volatility 3 Pluginsβ21Oct 3, 2022Updated 3 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direcβ¦β443Oct 1, 2025Updated 5 months ago
- Command and Control (C2) frameworkβ132May 16, 2025Updated 10 months ago
- Uses rpcdump to locate the ADCS server, and identify if ESC8 is vulnerable from unauthenticated perspective.β82Sep 13, 2024Updated last year
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboardβ13Mar 11, 2025Updated last year
- CVE-2023-7028β58Jan 12, 2024Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.β20Feb 2, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Monarch - The Adversary Emulation Toolkitβ64Jan 7, 2025Updated last year
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Feb 3, 2024Updated 2 years ago
- γπγProof of concept on BYOVD attackβ166Dec 7, 2024Updated last year
- An aggressor script that can help automate payload building in Cobalt Strikeβ118Jan 22, 2024Updated 2 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilegeβ226Nov 23, 2023Updated 2 years ago
- Postfix SMTP Smuggling - Expect Script POCβ23Dec 26, 2023Updated 2 years ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Recordβ45Dec 15, 2023Updated 2 years ago
- A CIA tradecraft technique to asynchronously detect when a process is created using WMI.β139Feb 2, 2026Updated last month
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.β46Oct 26, 2025Updated 5 months ago
- Managed Kubernetes at scale on DigitalOcean β’ AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.β66Mar 6, 2024Updated 2 years ago
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.β790Jan 9, 2025Updated last year
- Patching "signtool.exe" to accept expired certificates for code-signing.β342Feb 2, 2026Updated last month
- Only for educational purposesβ12Jun 17, 2023Updated 2 years ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.β26Nov 2, 2025Updated 4 months ago
- This repository implements Threadless Injection in Cβ172Dec 23, 2023Updated 2 years ago
- Service that scans your Infrastructure as Code for common vulnerabilitiesβ49Dec 14, 2023Updated 2 years ago