Demonized Shell is an Advanced Tool for persistence in linux.
☆445Jan 5, 2025Updated last year
Alternatives and similar repositories for D3m0n1z3dShell
Users that are interested in D3m0n1z3dShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,068Mar 1, 2026Updated last month
- ☆65Apr 28, 2024Updated last year
- Koth - TryHackMe Tricks☆191Nov 5, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Collection of UAC Bypass Techniques Weaponized as BOFs☆617Feb 21, 2024Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 3 months ago
- Azure DevOps Services Attack Toolkit☆151Mar 15, 2025Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Collection of codes focused on Linux rootkits☆205Oct 22, 2025Updated 5 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Jun 18, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆639May 8, 2025Updated 11 months ago
- Simulate the behavior of AV/EDR for malware development training.☆565Feb 15, 2024Updated 2 years ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆372Aug 29, 2025Updated 7 months ago
- Reverse shell that can bypass windows defender detection☆172Mar 31, 2026Updated last week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated 2 years ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,027Feb 1, 2026Updated 2 months ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆339Feb 27, 2026Updated last month
- Real fucking shellcode encryptor & obfuscator tool☆1,018Jan 7, 2026Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆818Mar 28, 2025Updated last year
- Because AV evasion should be easy.☆864Nov 28, 2024Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆196Sep 17, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆286Apr 6, 2025Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,430Updated this week
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Jan 14, 2024Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rust☆285Sep 26, 2024Updated last year
- ☆410Dec 8, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Extract and execute a PE embedded within a PNG file using an LNK file.☆466Nov 2, 2024Updated last year
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆288Jan 21, 2024Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 9 months ago
- A Linux persistence tool!☆160Sep 16, 2025Updated 6 months ago
- CPP AV/EDR Killer☆481Nov 28, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆526Feb 27, 2026Updated last month