andreafabrizi / prismLinks
PRISM is an user space stealth reverse shell backdoor, written in pure C.
☆469Updated 8 years ago
Alternatives and similar repositories for prism
Users that are interested in prism are comparing it to the libraries listed below
Sorting:
- Pwn nginx - a nginx backdoor provides shell access, socks5 tunneling, http password sniffing.☆229Updated 6 years ago
- A python reverse shell that uses DNS as the c2 channel☆507Updated 9 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆330Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆526Updated 4 years ago
- Simple linux backdoors and hiding techniques☆211Updated 7 years ago
- A multiple reverse shell session/client manager via terminal☆242Updated last year
- Hershell is a simple TCP reverse shell written in Go.☆531Updated 5 years ago
- Create a TCP circuit through validly formed HTTP requests☆347Updated 8 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆740Updated 8 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆541Updated 7 years ago
- It's the C version of https://github.com/mthbernardes/sshLooter☆266Updated 2 years ago
- Multiplatform reverse shell generator☆587Updated 5 years ago
- dump☆493Updated 6 years ago
- Automated DLL Enumerator☆533Updated 7 years ago
- A CVE-2016-5195 exploit example.☆326Updated 8 years ago
- CVE-2018-8120 Windows LPE exploit☆498Updated 7 years ago
- Hide processes as a normal user in Linux.☆258Updated 11 months ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆329Updated 7 years ago
- A little post-exploit tool that carefully clean *NIX access logs☆119Updated 7 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- just for fun ¯\_(ツ)_/¯☆271Updated 8 years ago
- POC of https://research.checkpoint.com/extracting-code-execution-from-winrar/☆268Updated 6 years ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike 2.x. Cortana Scripts are not compatible with Cobalt Stri…☆453Updated 4 years ago
- 🕳 godoh - A DNS-over-HTTPS C2☆782Updated last year
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,258Updated 2 years ago
- A proof of concept for the RDP Inception Attack☆348Updated 7 years ago
- A WebSocket C2 Tool☆398Updated 7 years ago
- Dump various types of Windows credentials without injecting in any process.☆425Updated 2 years ago
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆420Updated 6 years ago