RED-TEAM-444 / STEALTH-SHELLLinks
This tool generates an undetectable Windows reverse shell PowerShell script. Users can configure IP and Port according to their requirements. The generated script is obfuscated to avoid detection by antivirus software.
☆16Updated last year
Alternatives and similar repositories for STEALTH-SHELL
Users that are interested in STEALTH-SHELL are comparing it to the libraries listed below
Sorting:
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated last year
- hiding in plain sight: part 2☆45Updated last year
- exfiltration/infiltration toolkit☆24Updated last year
- A C2 framework built for my bachelors thesis☆55Updated 10 months ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 7 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 4 months ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated 11 months ago
- ☆58Updated 9 months ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆13Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆42Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆25Updated last year
- Repo for all my exploits/PoCs☆51Updated 3 months ago
- PowerShell script to generate ShellCode in various formats☆43Updated 11 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆19Updated 5 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆80Updated 4 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆96Updated 10 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- LSTAR - CobaltStrike Translated to EN☆21Updated 2 years ago
- APT-Attack-Simulation simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persistence and privile…☆60Updated last year
- C++ Code to perform a MiniDump of lsass.exe☆34Updated 2 years ago
- execute PE in memory Filelessly☆44Updated 6 months ago
- ☆35Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Updated last year
- A C2 framework for all your God Complex. A fully functional and integrated Botnet for remote command execution through user friendly UI.☆45Updated last year
- ☆29Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆40Updated 7 months ago
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆83Updated last year