SleepTheGod / WindowsLinks
Windows And Ways To Break It
☆98Updated 2 years ago
Alternatives and similar repositories for Windows
Users that are interested in Windows are comparing it to the libraries listed below
Sorting:
- ☆135Updated 3 weeks ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆66Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 7 months ago
- ☆85Updated last year
- Create and enumerate hidden desktops.☆88Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆84Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Basic reverse shell in C using socket() with complete explanation☆66Updated 2 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryption☆57Updated 2 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆71Updated 6 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆199Updated 7 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year
- vulnlab.com reaper writeup☆26Updated 2 years ago
- ☆105Updated last year
- A C2 framework built for my bachelors thesis☆57Updated 11 months ago
- DNS over HTTPS targeted malware (only runs once)☆95Updated 2 years ago
- ☆108Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Updated 2 years ago
- Repo for all my exploits/PoCs☆53Updated 5 months ago
- Rust Weaponization for Red Team Engagements.☆28Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆61Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated 2 years ago