ice-wzl / bash-malware-dropper
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
☆13Updated last year
Related projects: ⓘ
- ☆28Updated this week
- This is a working variant of the Mirai IOT botnet☆13Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated last year
- Python TCP server for terminal rickrolls☆11Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated last year
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆38Updated 5 months ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 10 months ago
- Small collection of Active Directory pentesting tools.☆24Updated 7 months ago
- Enumeration & fingerprint tool☆23Updated 6 months ago
- An offensive security framework for writing payloads☆13Updated 2 years ago
- i will upload all the books that helped me in learning in this repo☆19Updated last year
- ☆35Updated this week
- Your Handy Dandy Cyber Swiss Army Knife!☆21Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 3 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆10Updated last year
- AMSI Bypass for powershell☆29Updated 2 years ago
- A powerful reverse shell generator☆42Updated 2 years ago
- Notes for efficient and easier engagements - notes over time☆20Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Bypassing File Upload Restriction using Magic Bytes☆12Updated 2 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆15Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆38Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆34Updated 9 months ago
- ☆35Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆20Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Automate Blind SQL Injection with Python.☆19Updated 2 years ago
- Modular framework to exploit UPS devices☆61Updated last year
- ☆53Updated this week