Living Off The Land (LOTL) persistent Reverse shell
☆104Jan 14, 2024Updated 2 years ago
Alternatives and similar repositories for LOTL
Users that are interested in LOTL are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SNMP Bash Script to discover valid community strings, dump basic information, check for write permission and check for RCE.☆11Apr 27, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆66Mar 6, 2024Updated 2 years ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆445Jan 5, 2025Updated last year
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆196Sep 17, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- exfiltration/infiltration toolkit☆23Dec 20, 2023Updated 2 years ago
- Automated Multi UAC BYPASS for win10|win11|win12-pre-release|ws2019|ws2022☆462Apr 5, 2026Updated last week
- ☆25Jan 11, 2023Updated 3 years ago
- Reflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege☆227Nov 23, 2023Updated 2 years ago
- ☆319Mar 26, 2024Updated 2 years ago
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆291May 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆117Jul 17, 2024Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆146May 17, 2024Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Dec 20, 2023Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆172Mar 31, 2026Updated 2 weeks ago
- An aggressor script that can help automate payload building in Cobalt Strike☆118Jan 22, 2024Updated 2 years ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Nov 12, 2023Updated 2 years ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Jan 11, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40May 31, 2024Updated last year
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty☆18Feb 9, 2024Updated 2 years ago
- ☆74Apr 8, 2024Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- ☆61Dec 13, 2025Updated 4 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆816Mar 28, 2025Updated last year
- Windows Local Privilege Escalation Cookbook☆1,300Feb 5, 2026Updated 2 months ago
- The source code (including datasets) of V1SCAN (USENIX Security 2023; will be uploaded).☆41Nov 4, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Source code and examples for PassiveAggression☆64Jun 6, 2024Updated last year
- ☆44Jul 5, 2024Updated last year
- examples of using radius2 to solve reversing challenges☆36Jan 3, 2025Updated last year
- Remote Shellcode Injector☆221Aug 27, 2023Updated 2 years ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆593Oct 23, 2025Updated 5 months ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year