Mr-Un1k0d3r / DKMCLinks
DKMC - Dont kill my cat - Malicious payload evasion tool
☆1,392Updated 4 years ago
Alternatives and similar repositories for DKMC
Users that are interested in DKMC are comparing it to the libraries listed below
Sorting:
- AntiVirus Evasion Tool☆1,704Updated last month
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,282Updated 3 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- Python antivirus evasion tool☆1,428Updated last year
- Undetectable Windows Payload Generation☆1,598Updated 2 years ago
- HTA encryption tool for RedTeams☆1,397Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- PowerShell ReverseTCP Shell - Framework☆1,055Updated 2 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,504Updated last year
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Updated 4 years ago
- Python / C# Unmanaged PowerShell based RAT☆777Updated 2 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,255Updated last year
- Windows Event Log Killer☆1,786Updated last year
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,873Updated 4 years ago
- Some useful scripts for CobaltStrike☆845Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- Malicious Macro Generator☆829Updated 6 years ago
- Steal Net-NTLM Hash using Bad-PDF☆1,112Updated 4 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,538Updated 5 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆731Updated 2 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,610Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,923Updated 2 months ago
- Red Team Tool Kit☆1,118Updated 2 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆637Updated last year
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,319Updated 4 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,505Updated last year
- PowerShell script to quickly find missing software patches for local privilege escalation vulnerabilities.☆1,940Updated 6 years ago
- .NET IPv4/IPv6 machine-in-the-middle tool for penetration testers☆2,711Updated 9 months ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,423Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆1,507Updated 2 years ago