darkerego / blitzkloud
Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support
☆23Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for blitzkloud
- The best way to send emails in Go.☆10Updated 3 years ago
- Obfuscated Powershell Empire 2.x stager that allows for creation of a macro which uses VBA to backdoor .lnk files on the system. This is…☆16Updated 7 years ago
- Create a lnk shortcut file for Windows☆13Updated 5 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- ☆16Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 3 years ago
- A compilation of Aggressor/Sleep scripts for operational purposes that I've made.☆11Updated 3 years ago
- C2 and Post Exploitation Code☆34Updated last month
- C# loader capable of running stage-1 from remote url, file path as well as file share☆14Updated last year
- Finding SSL Blindspots for Red Teams☆30Updated 4 years ago
- ☆23Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆19Updated 3 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆12Updated last year
- ☆16Updated 4 years ago
- A malicious .cab creation tool for CVE-2021-40444☆12Updated 3 years ago
- post exploitation user monitoring tool☆19Updated 6 years ago
- MAC Address brute forcing tool, used to bypass MAC based filtering☆14Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- ☆16Updated 3 years ago