Untouchable17 / Reverse-TCP-ShellLinks
Reverse Shell - technique is commonly used in cyber attacks
☆19Updated last year
Alternatives and similar repositories for Reverse-TCP-Shell
Users that are interested in Reverse-TCP-Shell are comparing it to the libraries listed below
Sorting:
- Yandex browser password recovery☆10Updated 9 months ago
- ☆33Updated 2 weeks ago
- Antivirus Signature Search Toolkit☆81Updated 2 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 9 months ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆45Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆86Updated 10 months ago
- In-Memory Rootkit For Linux and BSD☆86Updated 5 months ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆24Updated 2 years ago
- ☆13Updated 2 years ago
- Keygen for Positive Technologies Network Attack Detector☆31Updated 2 years ago
- AES-256 Microsoft Cryptography API Example Use.☆34Updated 2 years ago
- Windows AppLocker Driver (appid.sys) LPE☆71Updated last year
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- GitHub CVE Repository Hunt☆18Updated last year
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆39Updated 11 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆97Updated last year
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- Z Anti-Anti-Debugger for Linux☆59Updated 5 months ago
- hiding in plain sight: part 2☆44Updated last year
- Decrypting yandex browser passwords☆26Updated 9 months ago
- Parent Process ID Spoofing, coded in CGo.☆24Updated 8 months ago
- Tool to retrieve Config from Redline C2 servers☆16Updated 2 years ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆81Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆44Updated 2 years ago
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Updated 4 months ago
- Simple ransomware written in Rust. Part of the building a rustomware blog post.☆34Updated 2 years ago
- A command and control (C2) server☆58Updated last year
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago