cr0mll / deserterLinks
A targeted DNS cache poisoner
☆120Updated 2 years ago
Alternatives and similar repositories for deserter
Users that are interested in deserter are comparing it to the libraries listed below
Sorting:
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 3 years ago
- ☆231Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆256Updated last year
- Hunting for passwords with deep learning☆213Updated last year
- Malware vulnerability intel tool for third-party attackers☆119Updated 7 months ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆266Updated 2 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆153Updated last year
- Simple & Customizable DNS Data Exfiltrator☆109Updated last year
- My new C2 framework☆40Updated 2 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆181Updated 2 months ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- Roast in the Middle☆292Updated 6 months ago
- Malicious shortcut generator for collecting NTLM hashes from insecure file shares.☆332Updated 7 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆129Updated 7 months ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- Venom is a library that meant to perform evasive communication using stolen browser socket☆382Updated last year
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆57Updated 3 weeks ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Updated 4 years ago
- Wordlist to crack .zip-file password☆203Updated 2 years ago
- Easy red team phishing with Puppeteer☆131Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆164Updated last month
- Traps web spiders☆74Updated 4 years ago
- ☆34Updated last year
- VPN Overall Reconnaissance, Testing, Enumeration and eXploitation Toolkit☆435Updated last year
- Basic C2 Server☆190Updated 3 years ago
- Generate graphs and charts based on password cracking result☆161Updated 2 years ago
- Convert shellcode into different formats!☆353Updated 2 years ago
- Red Team "Drop and Run" NAC (802.1x) Bypass☆73Updated last year