☆351May 25, 2023Updated 2 years ago
Alternatives and similar repositories for ssh-key-backdoor
Users that are interested in ssh-key-backdoor are comparing it to the libraries listed below
Sorting:
- ☆148May 22, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- Remote Shellcode Injector☆219Aug 27, 2023Updated 2 years ago
- ☆163Oct 25, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆22Jun 11, 2022Updated 3 years ago
- Kraken, a modular multi-language webshell coded by @secu_x11☆549Feb 10, 2024Updated 2 years ago
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- Connect like there is no firewall. Securely.☆1,831Feb 23, 2026Updated last week
- Lifetime AMSI bypass by @ZeroMemoryEx ported to .NET Framework 4.8☆351Aug 29, 2024Updated last year
- HVNC for Cobalt Strike☆1,301Dec 7, 2023Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆419Jan 31, 2026Updated last month
- A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers.☆787Jan 9, 2025Updated last year
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆285Mar 5, 2025Updated last year
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆672Oct 23, 2025Updated 4 months ago
- A suite of tools to disrupt campaigns using the Sliver C2 framework.☆282Aug 5, 2023Updated 2 years ago
- ☆39May 20, 2023Updated 2 years ago
- PoC to coerce authentication from Windows hosts using MS-WSP☆301Sep 7, 2023Updated 2 years ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- Kill AV/EDR leveraging BYOVD attack☆394Jul 11, 2023Updated 2 years ago
- A round-trip obfuscated HTTP file transfer setup built to bypass IDS detections.☆275May 10, 2024Updated last year
- Check IP addresses against known cloud provider IP address ranges☆47Feb 7, 2026Updated 3 weeks ago
- evilginx3 + gophish☆1,962Jun 15, 2024Updated last year
- Nuclei templates for honeypots detection.☆196Nov 7, 2023Updated 2 years ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆246Mar 19, 2024Updated last year
- Generate an obfuscated DLL that will disable AMSI & ETW☆330Jul 15, 2024Updated last year
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆880Mar 21, 2025Updated 11 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆158Feb 11, 2025Updated last year
- Abusing mhyprotect to kill AVs / EDRs / XDRs / Protected Processes.☆407Aug 22, 2023Updated 2 years ago
- Signtool for expired certificates☆515Jun 10, 2023Updated 2 years ago
- Dump NTDS with golden certificates and UnPAC the hash☆647Mar 20, 2024Updated last year
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆892Updated this week
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated last year
- Spartacus DLL/COM Hijacking Toolkit☆1,083Feb 1, 2024Updated 2 years ago
- ☆706Nov 7, 2023Updated 2 years ago
- ☆292Jul 20, 2023Updated 2 years ago
- reverse shell using curl☆478Apr 20, 2024Updated last year