cblack-r7 / coalLinks
Haxmas-2017 LD_PRELOAD rootkit in Golang
☆19Updated 7 years ago
Alternatives and similar repositories for coal
Users that are interested in coal are comparing it to the libraries listed below
Sorting:
- Collection of IronPython scripts and executables for penetration testing☆55Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Socks5 server over Websockets☆40Updated 6 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- ☆16Updated 5 years ago
- AV Bypass☆29Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- rev shell and manager in go☆20Updated 5 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Updated 7 years ago
- ☆20Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- ☆1Updated 6 years ago
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆47Updated 6 years ago
- web based nmap scan collection and search☆19Updated 4 years ago
- ☆33Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- Library of traffic redirectors☆26Updated 5 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- ☆15Updated 4 years ago
- A Linux RAT in C☆33Updated 6 years ago
- ☆16Updated 10 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago