RED-TEAM-444 / STEALTH-SHELL
This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
☆13Updated 9 months ago
Alternatives and similar repositories for STEALTH-SHELL:
Users that are interested in STEALTH-SHELL are comparing it to the libraries listed below
- ☆54Updated 6 months ago
- ☆28Updated last year
- Tool to aid in dumping LSASS process remotely☆38Updated 8 months ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated last year
- Situational Awareness script to identify how and where to run implants☆50Updated 4 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- A small red team course☆37Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Tool to obtain hash using MS-SNTP for user accounts☆21Updated 3 months ago
- Duplicate not owned Token from Running Process☆72Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆53Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 7 months ago
- ☆53Updated 4 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆60Updated this week
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 10 months ago
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆20Updated 2 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆39Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆29Updated 6 months ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 7 months ago
- A simple website to act as a store for havoc modules and extensions☆26Updated 3 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆41Updated 9 months ago
- ☆48Updated 2 years ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 9 months ago
- ☆55Updated 5 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated last year