Demonized Shell is an Advanced Tool for persistence in linux.
☆448Jan 5, 2025Updated last year
Alternatives and similar repositories for D3m0n1z3dShell
Users that are interested in D3m0n1z3dShell are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Feb 28, 2025Updated last year
- This is a simple process injection made in C for Linux systems☆29Sep 23, 2023Updated 2 years ago
- ↕️🤫 Stealth redirector for your red team operation security☆1,075Mar 1, 2026Updated 2 months ago
- ☆65Apr 28, 2024Updated 2 years ago
- Koth - TryHackMe Tricks☆192Nov 5, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Collection of UAC Bypass Techniques Weaponized as BOFs☆621Feb 21, 2024Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Feb 27, 2025Updated last year
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 4 months ago
- Azure DevOps Services Attack Toolkit☆151Updated this week
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.☆37Nov 16, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆187Jan 27, 2024Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Jun 18, 2024Updated last year
- Collection of codes focused on Linux rootkits☆207Oct 22, 2025Updated 6 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆640May 8, 2025Updated 11 months ago
- Simulate the behavior of AV/EDR for malware development training.☆567Feb 15, 2024Updated 2 years ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆376Aug 29, 2025Updated 8 months ago
- Reverse shell that can bypass windows defender detection☆173Mar 31, 2026Updated last month
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆375Apr 6, 2024Updated 2 years ago
- smbclient-ng, a fast and user friendly way to interact with SMB shares.☆1,028Apr 17, 2026Updated 2 weeks ago
- A GUI wrapper inside of Havoc to interact with bloodhound CE☆71Feb 3, 2024Updated 2 years ago
- A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs☆341Feb 27, 2026Updated 2 months ago
- Real fucking shellcode encryptor & obfuscator tool☆1,024Jan 7, 2026Updated 3 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆817Mar 28, 2025Updated last year
- Because AV evasion should be easy.☆867Nov 28, 2024Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆197Sep 17, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆285Apr 6, 2025Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,445Apr 9, 2026Updated 3 weeks ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆104Jan 14, 2024Updated 2 years ago
- Nameless C2 - A C2 with all its components written in Rust☆285Sep 26, 2024Updated last year
- ☆413Dec 8, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Extract and execute a PE embedded within a PNG file using an LNK file.☆465Nov 2, 2024Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote process☆289Jan 21, 2024Updated 2 years ago
- Rust implementation of phantom persistence technique documented in https://blog.phantomsec.tools/phantom-persistence☆64Jun 23, 2025Updated 10 months ago
- A Linux persistence tool!☆161Sep 16, 2025Updated 7 months ago
- CPP AV/EDR Killer☆480Nov 28, 2023Updated 2 years ago
- Tool to remotely dump secrets from the Windows registry☆527Feb 27, 2026Updated 2 months ago