Demonized Shell is an Advanced Tool for persistence in linux.
☆437Jan 5, 2025Updated last year
Alternatives and similar repositories for D3m0n1z3dShell
Users that are interested in D3m0n1z3dShell are comparing it to the libraries listed below
Sorting:
- ↕️🤫 Stealth redirector for your red team operation security☆1,066Jul 6, 2025Updated 7 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 2 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆607Feb 21, 2024Updated 2 years ago
- Azure DevOps Services Attack Toolkit☆150Mar 15, 2025Updated 11 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Feb 28, 2025Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆638May 8, 2025Updated 9 months ago
- Simulate the behavior of AV/EDR for malware development training.☆561Feb 15, 2024Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- Collection of codes focused on Linux rootkits☆198Oct 22, 2025Updated 4 months ago
- Example code samples from our ScriptBlock Smuggling Blog post☆95Jun 18, 2024Updated last year
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- ☆65Apr 28, 2024Updated last year
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆814Mar 28, 2025Updated 11 months ago
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- This is a simple process injection made in C for Linux systems☆30Sep 23, 2023Updated 2 years ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆70Feb 3, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Real fucking shellcode encryptor & obfuscator tool☆1,011Jan 7, 2026Updated last month
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆337Jun 23, 2025Updated 8 months ago
- Tool to remotely dump secrets from the Windows registry☆522Nov 18, 2025Updated 3 months ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,013Feb 1, 2026Updated last month
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆195Sep 17, 2024Updated last year
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆466Nov 2, 2024Updated last year
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆301Feb 2, 2026Updated last month
- Nameless C2 - A C2 with all its components written in Rust☆283Sep 26, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,408Jan 19, 2026Updated last month
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆514Aug 7, 2024Updated last year
- yet another AV killer tool using BYOVD☆305Dec 12, 2023Updated 2 years ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆442Oct 1, 2025Updated 5 months ago
- Active Directory reconnaissance and exploitation for Red Teams via the Active Directory Web Services (ADWS).☆586Mar 19, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆281Apr 6, 2025Updated 10 months ago
- AdaptixC2 is a highly modular advanced redteam toolkit☆2,733Feb 23, 2026Updated last week
- Because AV evasion should be easy.☆859Nov 28, 2024Updated last year
- CPP AV/EDR Killer☆480Nov 28, 2023Updated 2 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆862Feb 3, 2024Updated 2 years ago
- Bypassing UAC with SSPI Datagram Contexts☆461Sep 24, 2023Updated 2 years ago
- An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer☆539Feb 13, 2024Updated 2 years ago