EgeBalci / evilreplayLinks
Seamless remote browser session control
☆213Updated 3 months ago
Alternatives and similar repositories for evilreplay
Users that are interested in evilreplay are comparing it to the libraries listed below
Sorting:
- FortiWeb CVE-2025-25257 exploit☆62Updated 3 months ago
- PoCs of RCEs against open source C2 servers☆87Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆196Updated 11 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆215Updated 6 months ago
- Deserialization payload generator for a variety of .NET formatters☆131Updated 2 months ago
- ☆137Updated last year
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆249Updated 5 months ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆131Updated last year
- Chrome browser extension-based Command & Control☆177Updated 3 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆144Updated 9 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆100Updated 4 months ago
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆91Updated 3 months ago
- Active Directory Authentication Library☆79Updated 2 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆129Updated last year
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆104Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- ☆83Updated last year
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆59Updated 5 months ago
- Enumerate active EDR's on the system☆139Updated last month
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆250Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- ☆163Updated 2 years ago
- Port of Cobalt Strike's Process Inject Kit☆188Updated 10 months ago
- This tool, programmed in C#, allows for the fast discovery and exploitation of vulnerabilities in MSSQL servers☆53Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆63Updated last year
- ACL abuse swiss-knife☆123Updated 2 years ago
- The Official Sliver Armory☆118Updated 6 months ago