Untouchable17 / Reverse-TCP-ShellLinks
Reverse Shell - technique is commonly used in cyber attacks
☆19Updated last year
Alternatives and similar repositories for Reverse-TCP-Shell
Users that are interested in Reverse-TCP-Shell are comparing it to the libraries listed below
Sorting:
- Yandex browser password recovery☆11Updated 8 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆131Updated 8 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆42Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆78Updated last year
- In-Memory Rootkit For Linux and BSD☆86Updated 4 months ago
- AES-256 Microsoft Cryptography API Example Use.☆34Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- Antivirus Signature Search Toolkit☆82Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆71Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 10 months ago
- Keygen for Positive Technologies Network Attack Detector☆31Updated 2 years ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆39Updated 10 months ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆24Updated 2 years ago
- GitHub CVE Repository Hunt☆19Updated last year
- ☆27Updated 2 years ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆99Updated last year
- Decrypting yandex browser passwords☆28Updated 8 months ago
- Analyse MSI files for vulnerabilities☆140Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- Windows And Ways To Break It☆101Updated 2 years ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆142Updated 11 months ago
- Enumerate SSN (System Service Numbers or Syscall ID) and syscall instruction address in ntdll module by parsing the PEB of the current pr…☆21Updated last year
- ECC Public Key Cryptography☆37Updated 2 years ago
- ☆41Updated last year
- ☆13Updated 2 years ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆102Updated 6 months ago
- Privileger is a tool to work with Windows Privileges☆139Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Updated 3 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago