ice-wzl / bash-malware-dropper
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
☆18Updated last year
Alternatives and similar repositories for bash-malware-dropper:
Users that are interested in bash-malware-dropper are comparing it to the libraries listed below
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- ☆24Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated 10 months ago
- Breaking Active Directory Security with 🍞☆31Updated 3 months ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- Multithread reverse shell listener☆22Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆13Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆30Updated 2 years ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 6 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Updated last year
- Enumeration & fingerprint tool☆24Updated 11 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 10 months ago
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆40Updated last year
- Repo for all my exploits/PoCs☆37Updated this week
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 2 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Updated 3 weeks ago
- Tool to retrieve Config from Redline C2 servers☆16Updated last year