h3xduck / TCPcannonLinks
Offensive Linux tool for network attacks. Built from the ground with only C.
☆14Updated 4 years ago
Alternatives and similar repositories for TCPcannon
Users that are interested in TCPcannon are comparing it to the libraries listed below
Sorting:
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago
- ☆18Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆10Updated 3 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated 2 years ago
- ☆19Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆38Updated 3 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆17Updated 6 years ago
- Custom pentesting tools☆26Updated 5 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Support☆23Updated last year
- Personal notes from Red teamer for Blue/Red/Purple.☆57Updated last year
- Yet, Another Packer/Loader☆25Updated 2 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 3 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Polymorphic code obfuscator for use in Red Team operations☆32Updated 3 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 3 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆13Updated 3 years ago
- wsnet☆27Updated 2 months ago
- AMSI Bypass for powershell☆29Updated 3 years ago
- CloudflaredRAT is a simple combination of popular open-source tools, wrapping a local-facing shell with Cloudflares Argo Tunnel in an exe…☆14Updated 5 years ago