Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve clipboard contents, log keystrokes, bypass UAC and install AnyDesk for persistent remote access.
☆82Sep 16, 2024Updated last year
Alternatives and similar repositories for Infiltrax
Users that are interested in Infiltrax are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- ☆44Jul 9, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- List of some AD tools I frequently use☆57Nov 2, 2025Updated 5 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 11 months ago
- ☆18Feb 14, 2019Updated 7 years ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS security☆21Feb 18, 2026Updated last month
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Aug 5, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- ☆35Jan 23, 2025Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆255Jun 6, 2024Updated last year
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Templates for developing your own listeners and agents for AdaptixC2.☆49Feb 28, 2026Updated last month
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆308Nov 22, 2025Updated 4 months ago
- ☆100Sep 1, 2024Updated last year
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆42Jun 23, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- POC for CVE-2024-3183 (FreeIPA Rosting)☆27Aug 20, 2024Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Mar 27, 2025Updated last year
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- ☆65Jul 6, 2023Updated 2 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Jun 22, 2023Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆191Jul 30, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,430Updated this week
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆88Feb 22, 2025Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆511Aug 14, 2025Updated 7 months ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year