carnal0wnage / PoshRat
PowerShell Reverse HTTPs Shell
☆26Updated 10 years ago
Alternatives and similar repositories for PoshRat:
Users that are interested in PoshRat are comparing it to the libraries listed below
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- Random stuff☆16Updated 6 years ago
- HTTP BOTNET☆7Updated last year
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- Simple C# reverse shell with shellcode and process injection☆40Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Virus RAT v8.0 Beta☆21Updated 7 years ago
- ☆25Updated 6 years ago
- Making shellcode UD - https://osandamalith.com☆24Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Updated 9 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆52Updated 10 months ago
- Random source codes☆25Updated 4 years ago
- A simple reflective dll example☆19Updated 8 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Updated last year
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆24Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆31Updated 10 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆42Updated 7 years ago
- ☆15Updated 2 years ago
- ☆43Updated 5 years ago
- Abuses Powershell Profiles☆13Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- C2Shell is a shell script designed for a fast deploy of C&C servers for Red Team Operations.☆2Updated 4 years ago