Simple & Customizable DNS Data Exfiltrator
☆113Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for Invoke-DNSteal
Users that are interested in Invoke-DNSteal are comparing it to the libraries listed below
Sorting:
- Multiplatform Telegram Bot in pure PowerShell☆56Dec 1, 2022Updated 3 years ago
- Simple & Powerful PowerShell Script Obfuscator☆591May 13, 2025Updated 10 months ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 3 months ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Feb 28, 2025Updated last year
- Repository of tools used in my blog☆52Mar 22, 2024Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 2 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆600Aug 27, 2024Updated last year
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 3 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- A C# program featuring an all-in-one bypass for CLM, AppLocker and AMSI using Runspace.☆21Jul 31, 2022Updated 3 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- Multiplatform Python WebShell☆319Nov 24, 2025Updated 3 months ago
- PowerShell Ransomware Simulator with C2 Server☆498Jan 2, 2026Updated 2 months ago
- Dump stuff without touching disk☆163Oct 29, 2020Updated 5 years ago
- Bypassing AppLocker with C#☆144Jul 7, 2021Updated 4 years ago
- Run Powershell without software restrictions.☆281Sep 8, 2021Updated 4 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆156Apr 27, 2021Updated 4 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- load dumped csharp binaries as assemblies and launch them in memory☆28Feb 9, 2024Updated 2 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Mar 12, 2023Updated 3 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Aug 1, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆744Aug 18, 2023Updated 2 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- ☆24Apr 16, 2019Updated 6 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Determine if the WebClient Service (WebDAV) is running on a remote system☆27Sep 29, 2021Updated 4 years ago
- ☆412Dec 14, 2023Updated 2 years ago
- Obfuscate powershell scripts by replacing Function names, Variables and Parameters.☆521Nov 26, 2022Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆146May 1, 2021Updated 4 years ago