Malwareman007 / SyncRAT
A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.
☆18Updated last year
Alternatives and similar repositories for SyncRAT:
Users that are interested in SyncRAT are comparing it to the libraries listed below
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆11Updated 8 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- ☆24Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 5 months ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆10Updated 8 months ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- MacroExploit use in excel sheet☆20Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 9 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- ☆13Updated last year
- Pentesting Tools to Automatize Active Directory Hacking☆16Updated 2 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated last year
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 6 months ago
- Malware Libraries focused in help Malware Development☆15Updated last year
- Pathbyter is a lightning fast proof-of-concept ransomware that uses RSA wrapped AES, multiprocessing, in memory key encryption, appends e…☆27Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆17Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 8 months ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- A script to automate keystrokes through a graphical desktop program.☆33Updated this week
- Simple Shellcode Runner in Rust Language☆17Updated last year