ELMERIKH / Keres
Persistent Powershell backdoor tool {π}
β117Updated 8 months ago
Alternatives and similar repositories for Keres:
Users that are interested in Keres are comparing it to the libraries listed below
- Reverse shell that can bypass windows defender detectionβ164Updated last year
- β103Updated 7 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.β109Updated last year
- PDF dropper Red Team Scenairosβ204Updated 8 months ago
- An aggressor script that can help automate payload building in Cobalt Strikeβ115Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.β129Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterβ94Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β151Updated 11 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POCβ155Updated last year
- PowerShell Obfuscatorβ168Updated 10 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β76Updated 7 months ago
- Morpheus is a memory dumper that extracts lsass.exe in RAM and exfiltrates it via forged NTP packets. It uses RC4 encryption and Reed-Solβ¦β89Updated 2 weeks ago
- Continuous password spraying toolβ180Updated last month
- Living Off The Land (LOTL) persistent Reverse shellβ98Updated last year
- A C2 framework built for my bachelors thesisβ55Updated 5 months ago
- A shellcode injection tool showcasing various process injection techniquesβ134Updated last year
- yet another AV killer tool using BYOVDβ270Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.β61Updated 8 months ago
- Red Teaming tools and techniquesβ51Updated 2 years ago
- β60Updated 11 months ago
- βοΈ HTML Smuggling generator&obfuscator for your Red Team operationsβ162Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eacβ¦β51Updated 3 months ago
- Hide an IP address in scripts using hex/decimal/octal conversionsβ66Updated 2 weeks ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β147Updated 10 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β245Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety ofβ¦β374Updated 6 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AVβ67Updated 3 weeks ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms Fileβ249Updated last month
- Documents Exfiltration project for fun and educational purposesβ145Updated last year