ajmwagar / tetanusLinks
A proof-of-concept reverse-shell written in rust.
☆32Updated 6 years ago
Alternatives and similar repositories for tetanus
Users that are interested in tetanus are comparing it to the libraries listed below
Sorting:
- Fast and intuitive manager for multiple reverse shells☆85Updated last year
- My Python Cookiecutter project template☆32Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆21Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated last year
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Anonymize your hashcat formatted files for online cracking☆31Updated last year
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Password Spraying Framework☆63Updated 3 years ago
- PowerShell payload generator☆117Updated 4 years ago
- Kali configuration optimized for red teaming/pentesting/CTFs☆20Updated 2 years ago
- Machine Learning Network Share Password Hunting Toolkit☆128Updated 5 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 4 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Various scripts and codes☆84Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆75Updated 5 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆43Updated 6 years ago
- Basic Dart reverse shell code☆21Updated 2 years ago
- Escaping Restricted Environments and Bypassing DLP☆77Updated 6 years ago
- This repo is dedicated to a powerpoint exploit☆34Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 4 months ago
- Python3 Ebowla... 3Bowla☆17Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago