ReVBShell - Reverse VBS Shell
☆85Oct 22, 2025Updated 5 months ago
Alternatives and similar repositories for revbshell
Users that are interested in revbshell are comparing it to the libraries listed below
Sorting:
- Public exploits☆16May 28, 2018Updated 7 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- NmapPy - Python implementation of Nmap☆35Nov 27, 2018Updated 7 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Quick and dirty .net console app for querying mssql servers.☆24Aug 30, 2018Updated 7 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆36Nov 4, 2017Updated 8 years ago
- PowerShell rebuilt in C# for Red Teaming purposes☆1,052Feb 27, 2026Updated 3 weeks ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Credential Dumper☆79Feb 19, 2020Updated 6 years ago
- ☆35Nov 2, 2022Updated 3 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- ☆17Jul 26, 2018Updated 7 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Collection of CSharp Assemblies focused on Post-Exploitation Capabilities☆231May 30, 2019Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File to enable the webdav client service on x64 windows hosts☆23Sep 15, 2023Updated 2 years ago
- ☆95Oct 19, 2022Updated 3 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- A wrapper of ldap_shell.py module which in ntlmrelayx☆62Sep 22, 2022Updated 3 years ago
- Fake Windows logon screen to steal passwords☆1,372Feb 3, 2020Updated 6 years ago
- CVE-2020-14882 Weblogic-Exp☆17Oct 29, 2020Updated 5 years ago
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Automatically spin up infra for phishing☆63Feb 1, 2020Updated 6 years ago
- Python port of Pipal for password analytics☆22Oct 3, 2023Updated 2 years ago
- 2 ways of Password Filter DLL to record the plaintext password☆64Apr 17, 2021Updated 4 years ago
- C2Bridges allow developers to create new custom communication protocols and quickly utilize them within Covenant.☆72Feb 13, 2021Updated 5 years ago
- testing123☆13Nov 23, 2024Updated last year
- Tool for pivoting over SMB pipes☆16Jul 20, 2019Updated 6 years ago
- ☆14Sep 22, 2019Updated 6 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- dem sharp donuts☆202Sep 11, 2022Updated 3 years ago