Untouchable17 / Reverse-TCP-Shell
Reverse Shell - technique is commonly used in cyber attacks
☆16Updated last year
Alternatives and similar repositories for Reverse-TCP-Shell:
Users that are interested in Reverse-TCP-Shell are comparing it to the libraries listed below
- Cisco IOS Security Inspector☆22Updated this week
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆34Updated 2 months ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆34Updated 10 years ago
- Antivirus Signature Search Toolkit☆79Updated last year
- LNK-Dropper Builder☆21Updated 6 months ago
- PowerShell script to generate ShellCode in various formats☆42Updated 6 months ago
- GitHub CVE Repository Hunt☆18Updated 8 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆20Updated last year
- Make an Linux Kernel rootkit visible again.☆49Updated last month
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- Keygen for Positive Technologies Network Attack Detector☆23Updated last year
- ☆12Updated last year
- Collection of various WINAPI tricks / features used or abused by Malware☆14Updated 3 years ago
- ☆37Updated 3 weeks ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated 8 months ago
- Useful collection of scapy-scripts and more☆27Updated 9 months ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆20Updated 7 months ago
- ECC Public Key Cryptography☆37Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated 8 months ago
- ☆34Updated 11 months ago
- Proof of Concept example for abusing Process Hacker 2 (v2.39.124)☆21Updated 5 months ago
- IDA Python scripts☆34Updated this week
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆33Updated 3 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆19Updated this week
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆72Updated last year
- hiding in plain sight: part 2☆44Updated 8 months ago