d4rk007 / sak1to-shell
Multi-threaded, multi-os/platform (Linux/Windows) c2 server and Windows reverse TCP shell client both written in C.
☆121Updated 2 years ago
Alternatives and similar repositories for sak1to-shell:
Users that are interested in sak1to-shell are comparing it to the libraries listed below
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆90Updated last year
- Malicious Shortcut(.lnk) Generator☆81Updated 6 years ago
- Malware indetectable, with AV bypass techniques, anti-disassembly, etc.☆97Updated 5 years ago
- Bypass Malware Sandbox Evasion Ram check☆137Updated 2 years ago
- Simple reverse shell to avoid Win 11 defender detection☆119Updated 3 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆157Updated 3 years ago
- A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malwar…☆123Updated 3 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆91Updated 3 years ago
- WIP shellcode loader in nim with EDR evasion techniques☆212Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆108Updated last year
- pyCobaltHound is an Aggressor script extension for Cobalt Strike which aims to provide a deep integration between Cobalt Strike and Blood…☆138Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 3 years ago
- CVE-2021-40444☆65Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆64Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A basic c2 / agent.☆116Updated 5 years ago
- Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.☆123Updated 2 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.☆107Updated 2 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆75Updated 5 years ago
- (Demo) 3rd party agent for Havoc☆138Updated last year
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- Cobalt Strike BOF - Bypass AMSI in a remote process with code injection.☆377Updated 2 years ago
- C++ Windows Reverse Shell - Universal DLL Hijack | SSL Encryption | Statically Linked☆88Updated 5 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆170Updated 2 years ago
- Windows Privilege Escalation☆59Updated 2 years ago
- A C2 framework for initial access in Go☆180Updated 2 years ago
- Automated Tool That Generates The Perfect Meterpreter Powershell Payload☆225Updated 3 years ago
- Patching AmsiOpenSession by forcing an error branching☆145Updated last year