ELMERIKH / KeresLinks
Persistent Powershell backdoor tool {π}
β119Updated 10 months ago
Alternatives and similar repositories for Keres
Users that are interested in Keres are comparing it to the libraries listed below
Sorting:
- Reverse shell that can bypass windows defender detectionβ166Updated last year
- β103Updated 9 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterβ106Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- PDF dropper Red Team Scenairosβ211Updated 10 months ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ117Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testinβ¦β98Updated this week
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eacβ¦β52Updated 5 months ago
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ161Updated last year
- A C2 framework built for my bachelors thesisβ55Updated 7 months ago
- Living Off The Land (LOTL) persistent Reverse shellβ101Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β110Updated 2 years ago
- PowerShell Obfuscatorβ178Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversionsβ68Updated 2 months ago
- A shellcode injection tool showcasing various process injection techniquesβ137Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β152Updated last year
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defenderβ19Updated 5 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β249Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β78Updated 9 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms Fileβ308Updated 3 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ154Updated last year
- A collection of Cobalt Strike Aggressor scripts.β98Updated 3 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β149Updated last year
- Embed a payload inside a PNG fileβ323Updated 8 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromisβ¦β117Updated last year
- A solution to create obfuscated reverse shells for PowerShell.β78Updated 2 years ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.β135Updated 3 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575β88Updated 7 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CEβ71Updated last year