JoelGMSec / Invoke-DNStealView external linksLinks
Simple & Customizable DNS Data Exfiltrator
☆113Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for Invoke-DNSteal
Users that are interested in Invoke-DNSteal are comparing it to the libraries listed below
Sorting:
- Multiplatform Telegram Bot in pure PowerShell☆55Dec 1, 2022Updated 3 years ago
- Simple & Powerful PowerShell Script Obfuscator☆590May 13, 2025Updated 9 months ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Apr 17, 2022Updated 3 years ago
- Zero Infrastructure Password Cracking☆413Aug 22, 2024Updated last year
- PowerShell Asynchronous TCP Reverse Shell☆158Nov 27, 2025Updated 2 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Aug 4, 2023Updated 2 years ago
- Repository of tools used in my blog☆51Mar 22, 2024Updated last year
- A simple utility to check the status of and/or disable SMBv1 on Windows system via Cb Response's Live Response functionality.☆15May 28, 2019Updated 6 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Official Black Hat Arsenal Security Tools Repository☆12Aug 3, 2017Updated 8 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- The Shadow Attack Framework☆1,117Sep 4, 2022Updated 3 years ago
- The purpose of this tool is to collect all the subdomains using different subdomain finder tools and then filter out those subdomains whi…☆15Nov 21, 2022Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Sep 13, 2021Updated 4 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)☆14Nov 30, 2021Updated 4 years ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- Bypassing AppLocker with C#☆144Jul 7, 2021Updated 4 years ago
- Run Powershell without software restrictions.☆282Sep 8, 2021Updated 4 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆604Aug 27, 2024Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Mar 12, 2023Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Sep 4, 2021Updated 4 years ago
- PowerShell Ransomware Simulator with C2 Server☆500Jan 2, 2026Updated last month
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆101Mar 8, 2023Updated 2 years ago
- Just another vulnerable web application.☆36Jul 27, 2024Updated last year
- Convert shellcode into different formats!☆358Jan 24, 2023Updated 3 years ago
- ☆413Dec 14, 2023Updated 2 years ago
- Multiplatform Python WebShell☆320Nov 24, 2025Updated 2 months ago
- Post-exploitation NTLM password hash extractor☆19Apr 7, 2021Updated 4 years ago
- Weaponising C# - Fundamentals Training Content☆70May 11, 2021Updated 4 years ago
- SharpHook is an offensive API hooking tool designed to catch various credentials within the API call.☆321Jul 1, 2021Updated 4 years ago
- Process Ghosting Tool☆176Jun 22, 2021Updated 4 years ago
- A fast enumeration tool for Windows Active Directory Pentesting written in Go☆277Jan 14, 2023Updated 3 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- LSASS enumeration like pypykatz written in C-Lang☆20Dec 1, 2021Updated 4 years ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆347Oct 22, 2024Updated last year
- A modular framework designed to chain and automate security tests.☆44Jan 6, 2021Updated 5 years ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆747Aug 18, 2023Updated 2 years ago