RED-TEAM-444 / STEALTH-SHELLLinks
This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
☆18Updated last year
Alternatives and similar repositories for STEALTH-SHELL
Users that are interested in STEALTH-SHELL are comparing it to the libraries listed below
Sorting:
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆72Updated last year
- ☆59Updated 11 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- PowerShell script to generate ShellCode in various formats☆43Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 9 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- Situational Awareness script to identify how and where to run implants☆67Updated 10 months ago
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 9 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆85Updated 6 months ago
- A C2 framework built for my bachelors thesis☆56Updated 11 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆25Updated last year
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆100Updated 4 months ago
- hiding in plain sight: part 2☆45Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- Sliver agents for Mythic☆47Updated 11 months ago
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆75Updated last year
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆80Updated 3 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c …☆13Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago
- A python based Bot Net Framework☆42Updated 2 months ago
- C++ Code to perform a MiniDump of lsass.exe☆36Updated 2 years ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆41Updated 8 months ago