hackernese / SneakyEXELinks
Embedding a "UAC-Bypassing" function into your custom payload
☆96Updated 2 years ago
Alternatives and similar repositories for SneakyEXE
Users that are interested in SneakyEXE are comparing it to the libraries listed below
Sorting:
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆103Updated 7 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆115Updated 8 years ago
- ☆94Updated 6 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆82Updated 2 years ago
- ☆101Updated 7 years ago
- Ex-pv8's☆63Updated 5 years ago
- Avoidz tool to bypass most A.V softwares☆138Updated 7 years ago
- I created the python script to bypass UAC to get system shell .☆122Updated 5 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆109Updated 5 years ago
- ☆60Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆237Updated 2 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Updated 7 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆66Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- APT34/OILRIG leak☆231Updated 6 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆17Updated 7 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- How To Execute Shellcode via HTA☆139Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- ☆52Updated 11 years ago
- ASTROID v 1.2 bypass most A.V softwares☆88Updated 7 years ago
- This is Simple C# Source code to Bypass almost "all" AVS, (kaspersky v19, Eset v12 v13 ,Trend-Micro v16, Comodo & Windows Defender Bypass…☆113Updated 2 years ago