Whitecat18 / MavocLinks
Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines and can maintain multiple reverse connections .
β43Updated last year
Alternatives and similar repositories for Mavoc
Users that are interested in Mavoc are comparing it to the libraries listed below
Sorting:
- β160Updated 7 months ago
- Persistent Powershell backdoor tool {π}β122Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloβ¦β191Updated 2 weeks ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debuggingβ201Updated 7 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requirβ¦β153Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !β85Updated last month
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay aheadβ¦β132Updated 4 months ago
- β85Updated last year
- EDR & Antivirus Bypass to Gain Shell Accessβ246Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.β214Updated last week
- Embed a payload inside a PNG fileβ347Updated 11 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)β180Updated last year
- PDF dropper Red Team Scenairosβ223Updated last year
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++β255Updated 2 years ago
- PowerShell Obfuscatorβ209Updated last month
- Shellcode encryptor using a substitution cipher with a randomly generated key.β141Updated 8 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cliβ¦β78Updated last year
- β25Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.β143Updated 7 months ago
- β41Updated last year
- β161Updated 2 years ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β154Updated last year
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administrβ¦β181Updated last year
- I will be uploading all the codes which I created with the help either opensource projects or blogs. This is a step by step EDR learning β¦β284Updated 2 months ago
- An interactive shell to spoof some LOLBins command lineβ186Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Toolβ62Updated 2 months ago
- Command and Control (C2) frameworkβ131Updated 5 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,β¦β211Updated 5 months ago
- Enumerate active EDR's on the systemβ136Updated 3 weeks ago
- A C2 framework built for my bachelors thesisβ57Updated 11 months ago