Egida / kek
☆76Updated last year
Alternatives and similar repositories for kek:
Users that are interested in kek are comparing it to the libraries listed below
- enemy SSH Telnet IoT botnet☆60Updated 2 years ago
- LOLBINs that inject a DLL into a given process ID.☆137Updated 3 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆83Updated 2 years ago
- Windows NTLM Authentication Backdoor☆235Updated 2 months ago
- ☆61Updated 2 years ago
- Linux x86_64 Process Injection Utility☆59Updated 4 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆91Updated 4 years ago
- Client/server code that impersonates TLS 1.3 to disguise C2 activity.☆65Updated 2 years ago
- Bypass UAC by abusing the Internet Explorer Add-on installer☆51Updated 3 years ago
- Modular C2 framework aiming to ease post exploitation for red teamers.☆187Updated 2 years ago
- signed-loaders documents Windows executables that can be used for side-loading DLLs.☆66Updated 6 years ago
- CVE-2021-1732 poc & exp; tested on 20H2☆67Updated 3 years ago
- shellcode-loaders and beacon-loaders☆64Updated last year
- UAC bypass for x64 Windows 7 - 11(无弹窗版)☆281Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆133Updated last year
- lpe poc for cve-2022-21882☆49Updated 3 years ago
- Resources About Persistence, Multiple Platforms. Including ~80 Tools and 300+ Posts.☆99Updated 4 years ago
- POC for CVE-2021-21974 VMWare ESXi RCE Exploit☆179Updated 3 years ago
- Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique☆63Updated 2 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆210Updated 3 years ago
- This is a PoC for bypassing UAC using DLL hijacking and abusing the "Trusted Directories" verification.☆273Updated 3 years ago
- Another Go Shellcode Loader using Windows APIs☆139Updated 3 years ago
- Process Ghosting Tool☆170Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆122Updated 3 years ago
- Hide process,port,self under Linux using the ld_preload☆162Updated 3 years ago
- A C2 framework for initial access in Go☆177Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Botnet system from deep-web Russians forums. Tiny Nuke!☆90Updated 7 years ago
- Foxit PDF Reader Remote Code Execution Exploit☆115Updated last year
- generate CobaltStrike's cross-platform payload☆34Updated 9 months ago