Whitecat18 / MavocLinks
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
☆45Updated last year
Alternatives and similar repositories for Mavoc
Users that are interested in Mavoc are comparing it to the libraries listed below
Sorting:
- ☆164Updated 9 months ago
- Persistent Powershell backdoor tool {😈}☆121Updated last year
- ☆87Updated last year
- Embed a payload inside a PNG file☆363Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆211Updated last month
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆134Updated 6 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆141Updated 10 months ago
- PDF dropper Red Team Scenairos☆226Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆94Updated 2 weeks ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆256Updated 2 years ago
- RunPE implementation with multiple evasive techniques☆251Updated 2 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆152Updated 9 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Updated last year
- C# AV/EDR Killer using less-known driver (BYOVD)☆181Updated 2 years ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆65Updated last month
- A command and control framework.☆55Updated 11 months ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆36Updated last year
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 7 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆154Updated last year
- ☆163Updated 2 years ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆352Updated this week
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 4 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆459Updated 4 months ago
- ☆42Updated last year
- ☆106Updated last year
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆57Updated 9 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year