ELMERIKH / Keres
Persistent Powershell backdoor tool {π}
β110Updated 3 months ago
Related projects β
Alternatives and complementary repositories for Keres
- PDF dropper Red Team Scenairosβ151Updated 3 months ago
- β99Updated 2 months ago
- Reverse shell that can bypass windows defender detectionβ155Updated 9 months ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ112Updated 9 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β106Updated last year
- Documents Exfiltration project for fun and educational purposesβ144Updated last year
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ154Updated 9 months ago
- A shellcode injection tool showcasing various process injection techniquesβ134Updated 11 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β137Updated 5 months ago
- EDR & Antivirus Bypass to Gain Shell Accessβ214Updated last month
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β147Updated 6 months ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike β a Go-based tool for ethical hacking and Red Team operationβ¦β159Updated 2 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β235Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β158Updated last year
- β131Updated 10 months ago
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ158Updated 8 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β119Updated last year
- Nameless C2 - A C2 with all its components written in Rustβ241Updated last month
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASSβ201Updated 3 weeks ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β62Updated 3 months ago
- Amsi Bypass payload that works on Windwos 11β370Updated last year
- DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSβ¦β331Updated 3 months ago
- A C2 framework built for my bachelors thesisβ53Updated 2 weeks ago
- β163Updated last year
- Different methods to get current username without using whoamiβ172Updated 9 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)β156Updated last year
- Awesome AV/EDR/XDR Bypass Tipsβ252Updated last year
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β99Updated 9 months ago