ELMERIKH / KeresLinks
Persistent Powershell backdoor tool {😈}
☆121Updated last year
Alternatives and similar repositories for Keres
Users that are interested in Keres are comparing it to the libraries listed below
Sorting:
- Reverse shell that can bypass windows defender detection☆168Updated last year
- PDF dropper Red Team Scenairos☆227Updated last year
- ☆106Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated last year
- PowerShell Obfuscator☆223Updated 3 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆97Updated 3 weeks ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆257Updated 2 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated last month
- Youtube as C2 channel - Control Windows systems uploading QR videos to Youtube☆97Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated 11 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated 2 years ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 8 months ago
- ☆25Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆462Updated 4 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆110Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆117Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆189Updated last year
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- ☆59Updated 7 months ago
- Generate FUD backdoors☆262Updated 2 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆136Updated 3 weeks ago