MalwareTech / HiddenDesktop
Create and enumerate hidden desktops.
☆90Updated last year
Alternatives and similar repositories for HiddenDesktop:
Users that are interested in HiddenDesktop are comparing it to the libraries listed below
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆77Updated this week
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated 11 months ago
- Two in one, patch lifetime powershell console, no more etw and amsi!☆88Updated this week
- RegStrike is a .reg payload generator☆58Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- My Favorite Offensive Security Scripts☆70Updated last year
- ☆106Updated last year
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆48Updated 11 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Updated 3 weeks ago
- Inject RDPThief into memory with PowerShell.☆62Updated 3 months ago
- Construct the payload at runtime using an array of offsets☆63Updated 10 months ago
- A tool for carrying out brute force attacks against Office 365, with built in IP rotation use AWS gateways.☆79Updated 10 months ago
- PowerShell Reverse Shell☆61Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆82Updated last year
- A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.☆113Updated 3 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆65Updated 10 months ago
- Situational Awareness script to identify how and where to run implants☆50Updated 4 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆151Updated 4 months ago
- ☆179Updated 3 weeks ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆132Updated last year
- ☆117Updated last year
- ☆55Updated 5 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year