izenynn / c-reverse-shellLinks
A reverse shell for Windows and Linux written in C.
☆84Updated 3 years ago
Alternatives and similar repositories for c-reverse-shell
Users that are interested in c-reverse-shell are comparing it to the libraries listed below
Sorting:
- BSides Prishtina 2024 Malware Development and Persistence workshop☆124Updated 2 weeks ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆279Updated 3 months ago
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆80Updated 2 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆82Updated 3 years ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆315Updated 3 months ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆54Updated last year
- Analyse your malware to surgically obfuscate it☆515Updated last month
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆202Updated 2 years ago
- 🧞♂️ malware analysis☆37Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆150Updated last year
- RunPE implementation with multiple evasive techniques (1)☆377Updated 2 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆110Updated 3 years ago
- Windows Privilege Escalation☆101Updated last year
- Collection of codes focused on Linux rootkits☆192Updated 2 months ago
- ☆69Updated 4 years ago
- A curated list of resources for the OSED journey.☆71Updated 3 years ago
- CVE-2023-38831 PoC (Proof Of Concept)☆89Updated last year
- My collection of malware dev links☆304Updated 7 months ago
- A basic c2 / agent.☆120Updated 5 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆315Updated last month
- Windbg Readable & Dark Green Theme - Own Use☆46Updated 6 years ago
- The Red-book: The Art of Offensive CyberSecurity☆104Updated 2 weeks ago
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆210Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆350Updated 2 years ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆163Updated 9 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆65Updated last year
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆52Updated 4 years ago
- ☆161Updated 7 months ago
- ☆259Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆388Updated last year