Connection-less Powershell Persistent and Resilient Backdoor
☆232Sep 23, 2015Updated 10 years ago
Alternatives and similar repositories for Babadook
Users that are interested in Babadook are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated 2 months ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆387Jun 25, 2024Updated last year
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Simple but effective word list transmutation command-line app. Feed it words, and mangle them into new variations quickly and easily!☆33May 5, 2016Updated 9 years ago
- Forward local or remote tcp ports through SMB pipes.☆297Mar 7, 2021Updated 5 years ago
- PowerShell Runspace Post Exploitation Toolkit☆1,548Aug 2, 2019Updated 6 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Client/Server scripts to transfer files over DNS. Client scripts are small and only use native tools on the host OS.☆208Jan 24, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- Exploit the credentials present in files and memory☆844May 25, 2023Updated 2 years ago
- Babel Scripting Framework☆43Oct 28, 2020Updated 5 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- ☆121Oct 6, 2015Updated 10 years ago
- This is my implementation of JSRat.ps1 in Python so you can now run the attack server from any OS instead of being limited to a Windows O…☆301May 5, 2016Updated 9 years ago
- ☆163Aug 28, 2015Updated 10 years ago
- This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.☆687Oct 27, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆326Apr 26, 2020Updated 5 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆87Sep 26, 2016Updated 9 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Powershell C2 Server and Implants☆576Nov 11, 2019Updated 6 years ago
- For when Plan A fails☆13Jan 24, 2012Updated 14 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆762Jan 28, 2019Updated 7 years ago
- A PoC WMI backdoor presented at Black Hat 2015☆276Aug 10, 2015Updated 10 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆320Dec 29, 2017Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆526Apr 13, 2017Updated 8 years ago
- A fully featured backdoor that uses Twitter as a C&C server☆792Sep 30, 2020Updated 5 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago