cbrnrd / KumoLinks
A cross-platform remote administration tool written in Java
☆20Updated 4 years ago
Alternatives and similar repositories for Kumo
Users that are interested in Kumo are comparing it to the libraries listed below
Sorting:
- A quick tool for hiding a new process running shellcode.☆57Updated 5 years ago
- ✔A script that turns off Windows Defender☆23Updated 3 years ago
- Load PE via XML Attribute☆31Updated 5 years ago
- Simple shellcode obfuscator using PYTHON and C / C++☆74Updated 5 years ago
- muddyc3_golang☆21Updated 5 years ago
- Disable Windows Defender Silently (ByPass TamperProtection & ByPass Trustednstaller)☆35Updated 4 years ago
- ☆37Updated 4 years ago
- Encrypted Shellcode Loader Generator☆22Updated 6 years ago
- ☆35Updated 4 years ago
- Windows shellcode encoding and encrypting tool☆21Updated 3 years ago
- StenographyShellcodeLoader☆43Updated 4 years ago
- ☆11Updated 4 years ago
- ☆51Updated 5 years ago
- gui uac bypass (netplwiz.exe)☆66Updated 5 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Updated 5 years ago
- SqlServer Linked Password Dumper.☆16Updated 8 years ago
- PE Injection with ring3 hook bypass☆10Updated 4 years ago
- An AV evasion PoC tool☆9Updated 7 years ago
- A major platforms RAT Tools .High scalability.Now support Windows/Linux/MacOS☆84Updated 3 years ago
- Load the evilDLL from socket connection without touch disk☆17Updated 3 years ago
- MappingInjection via csharp☆39Updated 3 years ago
- Powerful script for logical obfuscation of powershell scripts☆28Updated 6 years ago
- Postgres Extension to Execute Shellcodes☆14Updated 4 years ago
- C++ implementation of DOUBLEPULSAR usermode shellcode. Yet another Reflective DLL loader.☆30Updated 3 years ago
- Kernel file/process/object tool☆67Updated 3 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆40Updated 5 years ago
- This PoC uses two diferent technics for stealing the primary token from all running processes, showing that is possible to impersonate a…☆55Updated 3 years ago
- Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers☆18Updated 3 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆40Updated 4 years ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Updated 2 years ago