Untouchable17 / Reverse-TCP-Shell
Reverse Shell - technique is commonly used in cyber attacks
☆15Updated 8 months ago
Related projects ⓘ
Alternatives and complementary repositories for Reverse-TCP-Shell
- Antivirus Signature Search Toolkit☆77Updated last year
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆29Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆43Updated last month
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆21Updated 11 months ago
- GitHub CVE Repository Hunt☆16Updated 3 months ago
- LNK-Dropper Builder☆16Updated 2 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆32Updated 3 months ago
- AES-256 Microsoft Cryptography API Example Use.☆29Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆36Updated 3 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆70Updated 8 months ago
- Tool to retrieve Config from Redline C2 servers☆16Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆62Updated 2 months ago
- PowerShell script to generate ShellCode in various formats☆39Updated last month
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- hiding in plain sight: part 2☆46Updated 4 months ago
- havoc kaine plugin to mitigate PAGE_GUARD protected image headers using JOP gadgets☆25Updated 3 months ago
- ☆39Updated 9 months ago
- A command and control framework.☆35Updated 3 months ago
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆32Updated 10 years ago
- Reverse Engineering and Malware Analysis Roadmap☆45Updated 3 months ago
- Parent Process ID Spoofing, coded in CGo.☆21Updated 4 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 2 years ago
- Cerez 😈 LD_PRELOAD rootkit☆22Updated last year
- This is a simple process injection made in C for Linux systems☆22Updated last year
- ☆24Updated 7 months ago
- ☆37Updated 3 weeks ago