jm33-m0 / emp3r0rLinks
Linux/Windows post-exploitation framework made by linux user
☆1,649Updated this week
Alternatives and similar repositories for emp3r0r
Users that are interested in emp3r0r are comparing it to the libraries listed below
Sorting:
- A modern multiple reverse shell sessions manager written in go☆1,632Updated this week
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,250Updated 5 years ago
- generate CobaltStrike's cross-platform payload☆2,521Updated 2 years ago
- RedGuard is a C2 front flow control tool,Can avoid Blue Teams,AVs,EDRs check.☆1,548Updated last year
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆1,872Updated last year
- A repository of Windows Shellcode runners and supporting utilities. The applications load and execute Shellcode using various API calls o…☆1,149Updated 2 years ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,456Updated 10 months ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,140Updated 7 months ago
- c++ fully undetected shellcode launcher ;)☆977Updated 4 years ago
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,738Updated 2 years ago
- A PowerShell script anti-virus evasion tool☆1,168Updated 2 years ago
- 👻Impost3r -- A linux password thief☆654Updated 9 months ago
- Template-Driven AV/EDR Evasion Framework☆1,753Updated 2 years ago
- Antivirus evasion project☆1,148Updated 10 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,863Updated 2 years ago
- Open-Source Shellcode & PE Packer☆2,035Updated last year
- POC to replicate the full 'Follina' Office RCE vulnerability for testing purposes☆1,146Updated 2 years ago
- shellcodeloader☆1,742Updated 5 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,245Updated last year
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,143Updated last year
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆4,346Updated 5 months ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,397Updated last year
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆2,061Updated 3 weeks ago
- ☆1,372Updated 5 years ago
- Open source C2 server created for stealth red team operations☆828Updated 3 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,182Updated 2 years ago
- Local Service to SYSTEM privilege escalation from Windows 7 to Windows 10 / Server 2019☆1,789Updated last year
- ☆2,424Updated this week
- HVNC for Cobalt Strike☆1,292Updated 2 years ago
- Sudo Baron Samedit Exploit☆784Updated 3 years ago