Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve clipboard contents, log keystrokes, bypass UAC and install AnyDesk for persistent remote access.
☆84Sep 16, 2024Updated last year
Alternatives and similar repositories for Infiltrax
Users that are interested in Infiltrax are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Passworld is a fully customizable wordlist generator☆16Sep 13, 2024Updated last year
- ☆44Jul 9, 2024Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Aug 19, 2024Updated last year
- List of some AD tools I frequently use☆58Nov 2, 2025Updated 6 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆18Feb 14, 2019Updated 7 years ago
- A series of PowerShell scripts to automate the assessment of Azure IaaS security☆22Feb 18, 2026Updated 3 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Aug 5, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- ☆36Jan 23, 2025Updated last year
- A POC to disable TamperProtection and other Defender / MDE components☆257Jun 6, 2024Updated last year
- This tool automates the process of running FFUF (Fuzz Faster U Fool) and post-processing its results to extract valid URLs. It supports b…☆36Nov 5, 2024Updated last year
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Templates for developing your own listeners and agents for AdaptixC2.☆50Feb 28, 2026Updated 2 months ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago
- ☆101Sep 1, 2024Updated last year
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆315Nov 22, 2025Updated 5 months ago
- Exploit for CVE-2024-5009☆13Jul 8, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- ☆41Jun 23, 2024Updated last year
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- POC for CVE-2024-3183 (FreeIPA Rosting)☆29Aug 20, 2024Updated last year
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 5 years ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- Analyse MSI files for vulnerabilities☆143Aug 30, 2024Updated last year
- Mythic C2 Agent written in x64 PIC C☆87Jan 29, 2025Updated last year
- ☆66Jul 6, 2023Updated 2 years ago
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Jun 22, 2023Updated 2 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆191Jul 30, 2024Updated last year
- Dump cookies and credentials directly from Chrome/Edge process memory☆1,459Apr 9, 2026Updated last month
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆87Feb 22, 2025Updated last year
- Python obfuscation for the average lambda enjoyer☆15Jun 15, 2023Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆43Jan 13, 2024Updated 2 years ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆520May 11, 2026Updated last week
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year