EgeBalci / evilreplayLinks
Seamless remote browser session control
☆189Updated last month
Alternatives and similar repositories for evilreplay
Users that are interested in evilreplay are comparing it to the libraries listed below
Sorting:
- PoCs of RCEs against open source C2 servers☆87Updated 10 months ago
- FortiWeb CVE-2025-25257 exploit☆50Updated last month
- ☆68Updated 7 months ago
- SOCKS5 proxy tool that uses Azure Blob Storage as a means of communication.☆229Updated 3 months ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆143Updated 7 months ago
- Microsoft Telnet Client MS-TNAP Server-Side Authentication Token Exploit☆56Updated 3 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆153Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆114Updated last year
- Identifies bad bytes from static analysis with any Anti-Virus scanner.☆127Updated last year
- Deserialization payload generator for a variety of .NET formatters☆111Updated last week
- bbs is a router for SOCKS and HTTP proxies. It exposes a SOCKS5 (or HTTP CONNECT) service and forwards incoming requests to proxies or ch…☆90Updated last month
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆196Updated 9 months ago
- Remotely Enumerate sessions using undocumented Windows Station APIs☆119Updated last year
- Chrome browser extension-based Command & Control☆166Updated last month
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆105Updated last year
- Port of Cobalt Strike's Process Inject Kit☆184Updated 8 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆205Updated 4 months ago
- ☆57Updated 9 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆138Updated 2 weeks ago
- Weaponized HellsGate/SigFlip☆199Updated 2 years ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆54Updated last year
- ☆83Updated last year
- ☆136Updated last year
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆270Updated 3 weeks ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- Local & remote Windows DLL Proxying☆165Updated last year
- Fully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for secu…☆243Updated last year
- Evasive Golang Loader☆133Updated last year
- ☆71Updated 3 months ago