Untouchable17 / Reverse-TCP-ShellLinks
Reverse Shell - technique is commonly used in cyber attacks
☆17Updated last year
Alternatives and similar repositories for Reverse-TCP-Shell
Users that are interested in Reverse-TCP-Shell are comparing it to the libraries listed below
Sorting:
- Yandex browser password recovery☆11Updated 7 months ago
- Templated Obfuscation example in C++ for protecting/hiding values in memory☆39Updated 9 months ago
- Antivirus Signature Search Toolkit☆81Updated 2 years ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 9 months ago
- C++ Staged Shellcode Loader with Evasion capabilities.☆98Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆67Updated last year
- Keygen for Positive Technologies Network Attack Detector☆31Updated last year
- A command and control framework.☆55Updated 10 months ago
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Updated 2 years ago
- ☆41Updated last year
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 7 months ago
- A stealthy, assembly-based tool for secure function address resolution, offering a robust alternative to GetProcAddress.☆73Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- Decrypting yandex browser passwords☆26Updated 7 months ago
- Privileger is a tool to work with Windows Privileges☆138Updated 2 years ago
- USB Monitor is a simple C# program that uses WMI to track information about newly connected and disconnected USB devices☆23Updated last year
- PowerShell script to generate ShellCode in various formats☆43Updated last year
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆43Updated last year
- Analyse MSI files for vulnerabilities☆138Updated last year
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆42Updated last year
- AES-256 Microsoft Cryptography API Example Use.☆35Updated last year
- Inject shellcode into a valid BMP/GIF image.☆32Updated 5 years ago
- LSTAR - CobaltStrike Translated to EN☆22Updated 2 years ago
- Multi-component Remote Access Trojan: C++ client (victim), C# server, and Angular frontend.☆39Updated 6 months ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆49Updated 2 years ago
- ☆36Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆115Updated 2 years ago
- ☆60Updated 6 months ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Updated 2 years ago