ELMERIKH / KeresLinks
Persistent Powershell backdoor tool {π}
β119Updated 10 months ago
Alternatives and similar repositories for Keres
Users that are interested in Keres are comparing it to the libraries listed below
Sorting:
- Reverse shell that can bypass windows defender detectionβ166Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- PDF dropper Red Team Scenairosβ208Updated 10 months ago
- PowerShell Obfuscatorβ178Updated 11 months ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ117Updated last year
- β103Updated 8 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β110Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ154Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β152Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eacβ¦β52Updated 5 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β148Updated 11 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β77Updated 8 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β247Updated last year
- yet another AV killer tool using BYOVDβ270Updated last year
- A shellcode injection tool showcasing various process injection techniquesβ136Updated last year
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ161Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- EDR & Antivirus Bypass to Gain Shell Accessβ239Updated 8 months ago
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β96Updated last month
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.β131Updated 2 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms Fileβ298Updated 2 months ago
- Red Teaming tools and techniquesβ52Updated 2 years ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated 9 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β389Updated 8 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) oβ¦β86Updated 10 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterβ95Updated last year
- Living Off The Land (LOTL) persistent Reverse shellβ100Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defenderβ26Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β157Updated last year