bcoles / metasploit-logosLinks
Custom Metasploit logos
☆54Updated 3 years ago
Alternatives and similar repositories for metasploit-logos
Users that are interested in metasploit-logos are comparing it to the libraries listed below
Sorting:
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- PowerShell payload generator☆118Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆59Updated 4 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆73Updated 4 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- Bypass Windows Defender with py2exe from memory.☆37Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 3 years ago
- A collection of tools created for computer security research purposes.☆131Updated 5 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Reverse shell using Windows Registry files (.reg)☆17Updated 5 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆102Updated 5 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆129Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.☆121Updated 3 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijacking☆42Updated 5 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆93Updated 4 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 5 years ago
- Linux Persistence Toolkit☆69Updated 3 years ago