ice-wzl / bash-malware-dropper
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
☆16Updated last year
Related projects ⓘ
Alternatives and complementary repositories for bash-malware-dropper
- Highly configurable script for dictionary/spray attacks against online web applications.☆54Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 7 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆17Updated 2 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆19Updated 2 years ago
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- the assembly shell and backdoor Trojan☆17Updated 2 years ago
- Notes for efficient and easier engagements - notes over time☆21Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆36Updated last month
- Classic Web shell upload techniques & Web RCE techniques☆24Updated 3 weeks ago
- Python TCP server for terminal rickrolls☆11Updated 3 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆39Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Enumeration & fingerprint tool☆23Updated 8 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆71Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Bypassing File Upload Restriction using Magic Bytes☆13Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆51Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆11Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- 「🧹」Clear logs after an invasion☆15Updated last year