Shell wrapper with keylogger (local log or syslog)
☆13Nov 1, 2017Updated 8 years ago
Alternatives and similar repositories for rootsh
Users that are interested in rootsh are comparing it to the libraries listed below
Sorting:
- Run commands over RDP on massive number of hosts☆11Nov 26, 2018Updated 7 years ago
- Apfell C2 Server for the Google Chrome Extension Payload☆12Aug 12, 2020Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- A userbot interface for Telegram. Uses TDLib.☆13Dec 11, 2021Updated 4 years ago
- Network Finger Printer☆16Nov 10, 2017Updated 8 years ago
- High resolution monotonic timers for Lua☆22Nov 7, 2018Updated 7 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated last month
- Cross-platform proxy selection with optional native authentication negotiation☆53Feb 25, 2023Updated 3 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Feb 2, 2020Updated 6 years ago
- Just some random stuff for AppLocker☆18Jan 30, 2019Updated 7 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- Reflectively load PE☆106Aug 4, 2020Updated 5 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Clipboard share tool in LAN via UDP broadcast for multiple computer users.☆22May 7, 2015Updated 10 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- Automated Subnet Scanner☆26Feb 25, 2025Updated last year
- Proper Payload Protection Prevents Poor Performance☆76Jul 27, 2022Updated 3 years ago
- Active Directory Group Policy analyzer☆18Sep 20, 2019Updated 6 years ago
- ☆33Aug 14, 2020Updated 5 years ago
- Lua wrapper for telegram-bot☆24Oct 26, 2018Updated 7 years ago
- ☆12Mar 10, 2018Updated 8 years ago
- Simple缠论量化工具集☆13May 4, 2022Updated 3 years ago
- ObscurityLabs RedTeam C# Toolkit☆122Sep 3, 2019Updated 6 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- 一个终端的盯盘软件,可以添加自己需要的股票和基金代码☆13Aug 19, 2025Updated 7 months ago
- Light modbus RTU Slave without SPL and HAL. This lib doesn't need timers, only UART and 2 channels of DMA.☆10Jun 25, 2019Updated 6 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2☆139Jan 5, 2023Updated 3 years ago
- Reverseshell Generator☆10Dec 13, 2017Updated 8 years ago
- Rite Of Passage ROP Injector☆35Aug 4, 2019Updated 6 years ago
- Burp with Friends☆102Jan 21, 2023Updated 3 years ago
- Sustainable shellcode evasion☆113Updated this week
- Inject libraries into 32 processes on macOS Mojave☆16Mar 2, 2020Updated 6 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- A PS forensics tool for Scraping, Filtering and Exporting Windows Event Logs☆15Sep 4, 2019Updated 6 years ago