githubesson / paradoxLinks
macos stealer poc
☆121Updated 3 weeks ago
Alternatives and similar repositories for paradox
Users that are interested in paradox are comparing it to the libraries listed below
Sorting:
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆190Updated last month
- ☆143Updated 2 months ago
- C2 writen in Rust & Go powered by Tor network.☆125Updated 3 weeks ago
- IPSpinner works as a local proxy that redirects requests through external services.☆70Updated 4 months ago
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆195Updated 5 months ago
- Persist like a Dodder☆62Updated 2 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆147Updated last year
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆75Updated last year
- Python3 utility for creating zip files that smuggle additional data for later extraction☆251Updated 2 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆137Updated last week
- Adversary Emulation Framework☆121Updated last month
- PoC that downloads an executable from a public SSL certificate☆119Updated 2 weeks ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆167Updated 10 months ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆150Updated 6 months ago
- A small How-To on creating your own weaponized WSL file☆101Updated 2 weeks ago
- An interactive shell to spoof some LOLBins command line☆185Updated last year
- StoneKeeper C2, an experimental EDR evasion framework for research purposes☆206Updated 7 months ago
- Decrypt GlobalProtect configuration and cookie files.☆150Updated 11 months ago
- A tool to transform Chromium browsers into a C2 Implant☆130Updated last week
- A Mythic Agent written in PIC C.☆196Updated 6 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆87Updated 7 months ago
- This repository contains custom modifications and enhancements for EvilGinx, a man-in-the-middle attack framework used for security resea…☆78Updated this week
- Interactive Shell and Command Execution over Named-Pipes (SMB) for Fileless lateral movement☆174Updated 2 months ago
- Various one-off pentesting projects written in Nim. Updates happen on a whim.☆161Updated 3 weeks ago
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆88Updated 4 months ago
- Situational Awareness script to identify how and where to run implants☆56Updated 8 months ago
- Utilities for obfuscating shellcode☆71Updated 4 months ago
- Deploy a phishing infrastructure on the fly.☆72Updated 7 months ago
- Library that eases the use of indirect syscalls. Quite interesting AV/EDR bypass as PoC.☆152Updated last week