Untouchable17 / Reverse-TCP-Shell
Reverse Shell - technique is commonly used in cyber attacks
☆15Updated 10 months ago
Alternatives and similar repositories for Reverse-TCP-Shell:
Users that are interested in Reverse-TCP-Shell are comparing it to the libraries listed below
- GitHub CVE Repository Hunt☆18Updated 5 months ago
- Antivirus Signature Search Toolkit☆78Updated last year
- PowerShell script to generate ShellCode in various formats☆41Updated 3 months ago
- Make an Linux Kernel rootkit visible again.☆46Updated 2 weeks ago
- VLAN ID Parser☆6Updated 7 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆70Updated 10 months ago
- Our Tips&Tricks☆39Updated this week
- Useful collection of scapy-scripts and more☆25Updated 6 months ago
- This is a simple process injection made in C for Linux systems☆26Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆30Updated last year
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆22Updated last year
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆19Updated 11 months ago
- LNK-Dropper Builder☆17Updated 3 months ago
- Privileger is a tool to work with Windows Privileges☆136Updated last year
- An asynchronous TCP and UDP port scanner developed by the late Jack C. Louis.☆32Updated 10 years ago
- LiteSpeed Cache Privilege Escalation PoC☆16Updated 4 months ago
- ChromeStealer is a tool for educational purposes to demonstrate how to extract and decrypt stored passwords from Google Chrome on a Windo…☆87Updated 5 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆47Updated 5 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆65Updated 8 months ago
- Offensive Router for Windows Pivoting☆15Updated 11 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆31Updated 10 months ago
- Inject shellcode into a valid BMP/GIF image.☆32Updated 4 years ago
- ☆166Updated last week