Rexinazor / Ensemble-HackToolsLinks
Ensemble-HackTools is an awesome collection of hacking tools.
☆25Updated last year
Alternatives and similar repositories for Ensemble-HackTools
Users that are interested in Ensemble-HackTools are comparing it to the libraries listed below
Sorting:
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- Memory Scaner☆63Updated 2 years ago
- Helping to automate payload development, testing, Opsec checking, beacon tasking, and deployment for Cobalt Strike☆52Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆64Updated 8 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Make an Linux Kernel rootkit visible again.☆55Updated 5 months ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- Python, C++ and Go☆22Updated 2 years ago
- C++ Code to perform a MiniDump of lsass.exe☆34Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆128Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆70Updated last year
- API hooking and code injection made easy!☆39Updated last year
- ☆33Updated last year
- ☆29Updated last year
- Original PoC for CVE-2023-30367☆14Updated last year
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Polymorphic code obfuscator for use in Red Team operations☆30Updated 3 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- x86_64 LKM linux rootkit☆16Updated 2 years ago
- Reverse shell macro using Word VBA☆15Updated 4 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆39Updated 3 months ago
- ☆12Updated last year
- Repository for archiving Cobalt Strike configuration☆33Updated this week
- ☆19Updated last year