ELMERIKH / KeresLinks
Persistent Powershell backdoor tool {😈}
☆122Updated last year
Alternatives and similar repositories for Keres
Users that are interested in Keres are comparing it to the libraries listed below
Sorting:
- PDF dropper Red Team Scenairos☆228Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆104Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆169Updated last year
- PowerShell Obfuscator☆225Updated 4 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆247Updated last year
- ☆106Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆100Updated last month
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆172Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆111Updated 2 years ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆257Updated 2 years ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆126Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆67Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 10 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆116Updated last year
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆142Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆152Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆189Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 9 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- ☆103Updated 11 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆493Updated 5 months ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- A shellcode injection tool showcasing various process injection techniques☆136Updated 2 years ago
- ☆94Updated last year