Whitecat18 / Mavoc
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
☆36Updated last year
Alternatives and similar repositories for Mavoc:
Users that are interested in Mavoc are comparing it to the libraries listed below
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆31Updated 9 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆148Updated 10 months ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- Commands and Scripts to attack Linux and Servers☆30Updated last week
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆47Updated 2 weeks ago
- An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot☆45Updated 2 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated last year
- A command and control framework.☆50Updated 4 months ago
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆61Updated last week
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated last year
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆105Updated 4 months ago
- ☆70Updated last year
- 「⚠️」Performing a BYOVD on the truesight.sys driver☆34Updated 5 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆121Updated last week
- Inject RDPThief into memory with PowerShell.☆63Updated 3 months ago
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆55Updated 3 weeks ago
- Injecting DLL into LSASS at boot☆93Updated last week
- A PoC for Early Cascade process injection technique.☆178Updated 3 months ago
- 「💀」Proof of concept on BYOVD attack☆158Updated 5 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- Command and Control (C2) framework☆126Updated last year
- Windows Kernel Mode Rootkit☆53Updated 2 weeks ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆42Updated last month
- ☆103Updated 7 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆186Updated 2 months ago
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆117Updated this week
- BSides Prishtina 2024 Malware Development and Persistence workshop☆80Updated this week
- ☆58Updated 7 months ago
- Malicious powershell scripts loader designed to avoid detection.☆51Updated last year
- Sleep obfuscation☆222Updated 4 months ago