Egida / kekLinks
☆75Updated 2 years ago
Alternatives and similar repositories for kek
Users that are interested in kek are comparing it to the libraries listed below
Sorting:
- enemy SSH Telnet IoT botnet☆61Updated 3 years ago
- Resources About Shellcode☆217Updated 5 years ago
- bdvl☆115Updated 3 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆70Updated 7 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆106Updated 5 years ago
- Botnet system from deep-web Russians forums. Tiny Nuke!☆94Updated 8 years ago
- dll proxying☆60Updated 4 years ago
- Injects HTML/PHP/ASP to the PE☆104Updated 5 years ago
- DLLHSC - DLL Hijack SCanner a tool to assist with the discovery of suitable candidates for DLL Hijacking☆156Updated 5 years ago
- Windows Defender ShellCode Execution Bypass☆129Updated 6 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆66Updated 4 years ago
- LOLBINs that inject a DLL into a given process ID.☆139Updated 4 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆83Updated 3 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆73Updated 3 years ago
- inject or convert shellcode to PE☆41Updated 6 years ago
- ☆61Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆279Updated 4 years ago
- This tool reveals hidden desktops and investigate processes/threads utilizing hidden desktops☆148Updated 4 years ago
- Windows NTLM Authentication Backdoor☆241Updated last year
- Experimental and sneaky backdoor patch for OpenSSH Portable.☆24Updated 4 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆133Updated 4 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆57Updated 4 years ago
- ☆10Updated 6 years ago
- Windows UAC bypass techniques implemented and written in Go☆216Updated 3 years ago
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- ☆73Updated 4 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆193Updated 3 years ago
- Domain Borrowing PoC☆218Updated 4 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆109Updated 5 years ago
- Poison Ivy Remote administrator tool Reload☆167Updated 2 months ago