cym13 / vbs-reverse-shellLinks
VBS reverse shell scripts
☆62Updated 7 years ago
Alternatives and similar repositories for vbs-reverse-shell
Users that are interested in vbs-reverse-shell are comparing it to the libraries listed below
Sorting:
- A tool to create obfuscated HTA script.☆179Updated 4 years ago
- Elite is the client-side component of the Covenant project. Covenant is a .NET command and control framework that aims to highlight the a…☆122Updated 2 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆145Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 4 years ago
- DLL Generator for side loading attack☆175Updated 6 years ago
- lateral movement techniques that can be used during red team exercises☆273Updated 5 years ago
- All of Your Copy/Paste Belong to Us: Stealing the clipboard and using it for C2 communications☆79Updated 6 years ago
- Custom C++ Reverse Shell POC | No AV Bypass Techniques or Tweaks Done | AVT Detection ratio: 2/61☆39Updated 8 years ago
- ☆42Updated 7 years ago
- SPF are not as strong as you may think. Red Team tool to send email on behalf of your target corp☆142Updated 4 years ago
- Windows RID Hijacking persistence technique☆176Updated last year
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆235Updated 2 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Obfuscated Penetration Testing PowerShell scripts☆150Updated last year
- Collection of awesome Cobalt Strike Aggressor Scripts. All credit due to the authors☆154Updated 6 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆272Updated 4 years ago
- Automating juicy potato local privilege escalation exploit for penetration testers☆145Updated 4 years ago
- Ultimate File Transfer List☆66Updated 3 years ago
- ☆180Updated 6 years ago
- Constrained Language Mode + AMSI bypass all in one☆160Updated 6 years ago
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆144Updated 4 years ago
- ☆173Updated 7 years ago
- polymorphic webshells☆30Updated 8 years ago
- ☆167Updated 2 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆167Updated 5 years ago
- A little tool to convert ccache tickets into kirbi (KRB-CRED) and vice versa based on impacket.☆169Updated 3 years ago
- Python based BloodHound data importer☆147Updated 2 years ago
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆100Updated last year
- easy-to-use payload hosting☆274Updated 3 years ago
- This is a weaponized WSUS exploit☆295Updated 3 years ago