izenynn / c-reverse-shellLinks
A reverse shell for Windows and Linux written in C.
☆76Updated 3 years ago
Alternatives and similar repositories for c-reverse-shell
Users that are interested in c-reverse-shell are comparing it to the libraries listed below
Sorting:
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 2 years ago
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆99Updated 3 years ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆85Updated last month
- Some notes + exercises that I've done during my study for the Offensive Security Exploit Developer.☆66Updated 2 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- Simple undetectable shellcode and code injector launcher example. Inspired by RTO malware development course.☆249Updated 8 months ago
- My collection of malware dev links☆277Updated last month
- Analyse your malware to surgically obfuscate it☆483Updated last month
- A curated list of resources for the OSED journey.☆64Updated 3 years ago
- Offensive Lua.☆188Updated last year
- A QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.☆204Updated 2 years ago
- Windows Privilege Escalation☆89Updated 11 months ago
- ☆260Updated last year
- CVE-2023-38831 PoC (Proof Of Concept)☆82Updated 11 months ago
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆291Updated 3 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆126Updated 6 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆81Updated 4 months ago
- ☆133Updated 2 years ago
- Python based WinDbg script to automate the search for code caves in binaries and libraries.☆50Updated 6 months ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆50Updated 3 months ago
- transform your payload into ipv4/ipv6/mac arrays☆186Updated 2 years ago
- QuoteDB - A Vulnerable TCP Server to practice Win32 exploitation☆71Updated last year
- Signatus - A Vulnerable TCP server to practice Win32 exploitation☆49Updated 4 years ago
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆310Updated 10 months ago
- ☆356Updated last year
- Basic reverse shell in C using socket() with complete explanation☆65Updated 2 years ago
- SeManageVolumePrivilege to SYSTEM☆128Updated last year
- ☆140Updated last month
- Collection of codes focused on Linux rootkits☆133Updated last month
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆72Updated 2 weeks ago