alexdhital / InfiltraxView external linksLinks
Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve clipboard contents, log keystrokes, bypass UAC and install AnyDesk for persistent remote access.
☆82Sep 16, 2024Updated last year
Alternatives and similar repositories for Infiltrax
Users that are interested in Infiltrax are comparing it to the libraries listed below
Sorting:
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Aug 19, 2024Updated last year
- ☆43Jul 9, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆84Aug 5, 2024Updated last year
- Toolkit of Projects to attack and evade Event Trace for Windows☆26Aug 28, 2025Updated 5 months ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 9 months ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆22Feb 27, 2025Updated 11 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- ☆18Feb 14, 2019Updated 7 years ago
- Mythic C2 Agent written in x64 PIC C☆84Jan 29, 2025Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS security☆21Oct 30, 2024Updated last year
- This script leverages CVE-2023046604 (Apache ActiveMQ) to generate a pseudo shell. The vulnerability allows for remote code execution due…☆18Jan 24, 2024Updated 2 years ago
- A POC to disable TamperProtection and other Defender / MDE components☆253Jun 6, 2024Updated last year
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆86Feb 22, 2025Updated 11 months ago
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆189Jul 30, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- BypassCredGuard CS BOF☆49Jan 23, 2025Updated last year
- Post-Ex BOF tooling for Hannibal☆24Nov 20, 2024Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆128Oct 4, 2024Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆173Dec 19, 2025Updated last month
- DFSCoerce exe revisited version with custom authentication☆42Jan 13, 2024Updated 2 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated 10 months ago
- ☆44Apr 27, 2024Updated last year
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆298Nov 22, 2025Updated 2 months ago
- ☆100Sep 1, 2024Updated last year
- A work in progress of constructing a minimal http(s) beacon for Cobalt Strike.☆27Apr 28, 2022Updated 3 years ago