ariary / tacosLinks
๐ฎ INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)
โ32Updated 2 years ago
Alternatives and similar repositories for tacos
Users that are interested in tacos are comparing it to the libraries listed below
Sorting:
- Router socks. One port socks for all the others.โ69Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.โ68Updated 6 years ago
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)โ166Updated 4 years ago
- A little implant which SSH's back with a shellโ38Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements frameworkโ96Updated 4 years ago
- Port forwarding via MSRPC (445/tcp) [WIP]โ33Updated 4 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps โฆโ22Updated 3 years ago
- PoC-Malware-TTPsโ49Updated 2 years ago
- Map remote .NET assemblies to memory for further invocation.โ40Updated 4 years ago
- Right-To-Left Override POCโ36Updated 3 years ago
- c# reverse shell pocโ26Updated last month
- C# .Net 5.0 project to build BOF (Beacon Object Files) in massโ25Updated 2 years ago
- Tool to start processes as SYSTEM using token duplicationโ38Updated 5 years ago
- A simple reverse ssh/proxy implant PoC for *nix systems.โ57Updated last year
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343โฆโ43Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeโฆโ21Updated 3 years ago
- reverse socks tunneler with ntlm and proxy supportโ60Updated 3 years ago
- โ12Updated 2 years ago
- Basic Dart reverse shell codeโ21Updated 2 years ago
- A third-party Gopher Assassin for the Havoc Framework.โ44Updated 2 years ago
- Exploit for HiveNightmare - CVE-2021โ36934โ61Updated 5 months ago
- Enumerate AWS cloud resources based on provided credentialโ51Updated 3 years ago
- Open-Source Phishing Toolkitโ19Updated 4 years ago
- ShootCutMe an .LNK file creator tool for redteamerโ15Updated last year
- An evil bit backdoor for iptablesโ55Updated 4 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhilโ21Updated 3 years ago
- Self-healing RAT utilizing libp2pโ88Updated 5 years ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog โฆโ86Updated 2 years ago
- Beacon payload using AV bypass method from https://github.com/fullmetalcache/CsharpMMNiceness and shellcode generated from https://githubโฆโ20Updated 4 years ago
- Tool for efficient directory enumerationโ65Updated last year