Trevohack / DynastyPersistLinks
A Linux persistence tool!
☆153Updated last year
Alternatives and similar repositories for DynastyPersist
Users that are interested in DynastyPersist are comparing it to the libraries listed below
Sorting:
- CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4☆151Updated last year
- Reverse shell that can bypass windows defender detection☆166Updated last year
- Heavily obfuscated ASP web shell generation tool.☆164Updated last year
- MultiPlatform HTTP Reverse Shell☆236Updated 8 months ago
- CVE-2023-35078 Remote Unauthenticated API Access Vulnerability Exploit POC☆118Updated last year
- ☆154Updated 10 months ago
- exploit for f5-big-ip RCE cve-2023-46747☆203Updated 7 months ago
- ☆164Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated 8 months ago
- The C2 Cloud is a robust web-based C2 framework, designed to simplify the life of penetration testers. It allows easy access to compromis…☆115Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- PowerShell Obfuscator☆178Updated last year
- Reverse shell listener and payload generator designed to work on most Linux targets☆106Updated 10 months ago
- Escalate Service Account To LocalSystem via Kerberos☆395Updated last year
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆181Updated 8 months ago
- An aggressor script that can help automate payload building in Cobalt Strike☆117Updated last year
- Linux Incident Response Reporting☆85Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 9 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆301Updated 2 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated 9 months ago
- Zimbra - Remote Command Execution (CVE-2024-45519)☆122Updated 2 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆417Updated 7 months ago
- A Tool that aims to evade av with binary padding☆151Updated 11 months ago
- SQLMap Command Generator: A web-based tool to easily generate customizable SQLMap commands for testing SQL injection vulnerabilities. Fea…☆66Updated 6 months ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆128Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆76Updated 3 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆132Updated 3 months ago
- ☆228Updated 6 months ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Updated last year
- The Official Sliver Armory☆109Updated last month