ariary / volanaLinks
🌒 Shell command obfuscation to avoid detection systems
☆125Updated 2 years ago
Alternatives and similar repositories for volana
Users that are interested in volana are comparing it to the libraries listed below
Sorting:
- Golang binary for data exfiltration with ICMP protocol (+ ICMP bindshell, http over ICMP tunneling, ...)☆147Updated 3 years ago
- Speedy probe-based UDP service scanner☆88Updated this week
- A robust Red Team proxy written in Go.☆160Updated 3 years ago
- A fingerprint generation helper for nuclei network templates☆73Updated 2 years ago
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆64Updated last year
- The Official Sliver Armory☆109Updated 2 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆157Updated last year
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 7 months ago
- ☆88Updated last year
- PoCs of RCEs against open source C2 servers☆83Updated 8 months ago
- 🔎🪲 Malleable C2 profiles parser and assembler written in golang☆66Updated last year
- 🐍 Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.☆157Updated last year
- ☆234Updated 7 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆267Updated 3 months ago
- Reverse shell listener and payload generator designed to work on most Linux targets☆106Updated 10 months ago
- Repo for all my exploits/PoCs☆51Updated last month
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆91Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 11 months ago
- C2 Automation using Linode☆82Updated 2 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- Set of python scripts which perform different ways of command execution via WMI protocol.☆159Updated last year
- A Linux persistence tool!☆153Updated last year
- DDSpoof is a tool that enables DHCP DNS Dynamic Update attacks against Microsoft DHCP servers in AD environments.☆126Updated last year
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆100Updated 9 months ago
- ☆81Updated 10 months ago
- A critical security vulnerability, identified as CVE-2023-50164 (CVE: 9.8) was found in Apache Struts, allowing attackers to manipulate f…☆82Updated 9 months ago
- SSH Zero-Day Made By ClumsyLulz☆124Updated 3 months ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆64Updated this week
- Get root via TTY / TIOCSTI stuffing☆76Updated last month
- VMware Aria Operations for Logs CVE-2023-34051☆63Updated last year