freeide / powershell-backdoor-generatorLinks
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build for evasion.
☆29Updated last year
Alternatives and similar repositories for powershell-backdoor-generator
Users that are interested in powershell-backdoor-generator are comparing it to the libraries listed below
Sorting:
- A C2 framework built for my bachelors thesis☆55Updated 7 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- ☆19Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- A small executable to trick a user to authenticate using code matching MFA☆69Updated last year
- ☆14Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆56Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated last year
- A Moodle Scanner☆42Updated 6 months ago
- ☆51Updated last year
- Fast Path Traversal exploitation tool☆21Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- ☆35Updated last year
- Cobalt Strike BOFS☆16Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- POC for CVE-2024-3183 (FreeIPA Rosting)☆22Updated 9 months ago
- vulnlab.com reaper writeup☆26Updated last year
- RegStrike is a .reg payload generator☆58Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- ☆27Updated 2 years ago
- MacroExploit use in excel sheet☆20Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated last year
- quick and dirty proof-of-concept to hide shells in images☆50Updated 11 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated 2 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆30Updated 2 months ago