hackernese / SneakyEXE
Embedding a "UAC-Bypassing" function into your custom payload
☆96Updated 2 years ago
Alternatives and similar repositories for SneakyEXE:
Users that are interested in SneakyEXE are comparing it to the libraries listed below
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆100Updated 7 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆80Updated last year
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- I created the python script to bypass UAC to get system shell .☆122Updated 5 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆84Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- Python api for usage with cobalt strike's External C2 specification☆234Updated 2 years ago
- Ex-pv8's☆63Updated 5 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆249Updated 4 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆113Updated 8 years ago
- ☆101Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- How To Execute Shellcode via HTA☆137Updated 7 years ago
- Windows active user credential phishing tool☆282Updated 5 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- OpenSource cross-platform python security toolkit (remote shell)☆45Updated 2 years ago
- ☆94Updated 6 years ago
- This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploi…☆144Updated 3 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Updated last month
- ☆94Updated 6 years ago
- ☆177Updated 6 years ago
- DNS-Persist is a post-exploitation agent which uses DNS for command and control.☆211Updated 7 years ago
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 5 years ago