Whitecat18 / MavocLinks
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
☆44Updated last year
Alternatives and similar repositories for Mavoc
Users that are interested in Mavoc are comparing it to the libraries listed below
Sorting:
- ☆161Updated 8 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆206Updated last week
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- PDF dropper Red Team Scenairos☆224Updated last year
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆133Updated 5 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆256Updated 2 years ago
- Embed a payload inside a PNG file☆356Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 8 months ago
- ☆85Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆86Updated 2 months ago
- A guide to learning antivirus evasion☆55Updated 7 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆140Updated 9 months ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆146Updated 8 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆180Updated last year
- RunPE implementation with multiple evasive techniques☆234Updated last month
- PowerShell Obfuscator☆214Updated 2 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆80Updated last year
- Enumerate active EDR's on the system☆141Updated last month
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆212Updated 6 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆291Updated 2 weeks ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated last year
- The different ways to dump lsass☆195Updated 2 months ago
- ☆106Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆104Updated 5 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆156Updated 3 months ago
- ☆162Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆72Updated last year
- Our Tips&Tricks☆126Updated 8 months ago