Whitecat18 / MavocLinks
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
β43Updated last year
Alternatives and similar repositories for Mavoc
Users that are interested in Mavoc are comparing it to the libraries listed below
Sorting:
- β160Updated 7 months ago
- Persistent Powershell backdoor tool {π}β122Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !β84Updated last month
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloβ¦β189Updated last week
- β85Updated last year
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β256Updated 2 years ago
- C# AV/EDR Killer using less-known driver (BYOVD)β180Updated last year
- EDR & Antivirus Bypass to Gain Shell Accessβ245Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it fromβ¦β36Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β153Updated last year
- PDF dropper Red Team Scenairosβ222Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay aheadβ¦β130Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ199Updated 7 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.β192Updated last week
- A command and control framework.β55Updated 9 months ago
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning β¦β284Updated 2 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malwareβ57Updated last month
- PowerShell Obfuscatorβ207Updated last month
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrβ¦β180Updated last year
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Botβ56Updated 7 months ago
- Embed a payload inside a PNG fileβ345Updated 11 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β78Updated last year
- β105Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionalityβ50Updated 2 years ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.β141Updated 7 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.β141Updated 8 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysisβ66Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,β¦β210Updated 5 months ago
- Write-ups and proof of concepts of design and implementaion of various modern malwares.β29Updated 2 years ago
- γπγProof of concept on BYOVD attackβ163Updated 10 months ago