TheFlash2k / RaidwareLinks
A C2 Framework developed as an FYP
☆11Updated 3 weeks ago
Alternatives and similar repositories for Raidware
Users that are interested in Raidware are comparing it to the libraries listed below
Sorting:
- A reverse shell for Windows and Linux written in C.☆86Updated 3 years ago
- All the lab manuals, tasks and their solutions for the course CY243 - Penetration Testing along with a Teacher's manual for Lab Setup wil…☆16Updated 2 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆113Updated 3 years ago
- CVE-2025-56383-Proof-of-Concept☆55Updated 4 months ago
- ☆57Updated 2 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Updated 2 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated last month
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆106Updated 2 months ago
- CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.☆62Updated last year
- A set of tools and resources for analysis of Havoc C2☆26Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆83Updated 3 years ago
- ☆86Updated 3 years ago
- CVE-2023-38831 PoC (Proof Of Concept)☆89Updated last year
- ☆106Updated last year
- Generate FUD backdoors☆262Updated 2 years ago
- This is poc of CVE-2022-46169 authentication bypass and remote code execution☆16Updated 2 years ago
- Repository containing all training and tutorials completed in preparation for the OSEE in conjunction with the AWE course.☆120Updated 3 months ago
- A Havoc UI tool to pivot onto a machine using ligolo-ng☆50Updated 2 years ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆67Updated last year
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- ☆18Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- ☆106Updated 11 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆84Updated 2 years ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated last year
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆121Updated last year
- ☆133Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆24Updated last year
- ☆163Updated 7 months ago