ice-wzl / bash-malware-dropperLinks
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
☆18Updated last year
Alternatives and similar repositories for bash-malware-dropper
Users that are interested in bash-malware-dropper are comparing it to the libraries listed below
Sorting:
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆63Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆28Updated 2 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆45Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 3 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- Bypassing File Upload Restriction using Magic Bytes☆18Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- A powerful reverse shell generator☆44Updated 3 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated 2 years ago
- ☆33Updated last year
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆32Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆51Updated 4 years ago
- An offensive security framework for writing payloads☆17Updated 2 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Updated 6 months ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆38Updated 8 months ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 7 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- CVE-2023-20052, information leak vulnerability in the DMG file parser of ClamAV☆28Updated 2 years ago
- Python TCP server for terminal rickrolls☆12Updated 3 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆58Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Personal notes from Red teamer for Blue/Red/Purple.☆56Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆20Updated 2 years ago
- a small wiper malware programmed in c#☆58Updated 2 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago