RED-TEAM-444 / STEALTH-SHELLLinks
This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
☆18Updated last year
Alternatives and similar repositories for STEALTH-SHELL
Users that are interested in STEALTH-SHELL are comparing it to the libraries listed below
Sorting:
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆109Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆72Updated last year
- quick and dirty proof-of-concept to hide shells in images☆51Updated last year
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 10 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆102Updated 5 months ago
- C++ Code to perform a MiniDump of lsass.exe☆36Updated 2 years ago
- ☆28Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- A C2 framework built for my bachelors thesis☆56Updated last week
- Quicky serve files over http or https using flask.☆35Updated 10 months ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆62Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆41Updated 9 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated last year
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆22Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆27Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated 2 years ago
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated 2 years ago
- ☆59Updated last year
- ☆11Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- ☆27Updated 2 years ago
- RegStrike is a .reg payload generator☆58Updated 2 years ago