keklick1337 / PhantomGateLinks
Minimalistic port-spoofer written in Python
☆12Updated 10 months ago
Alternatives and similar repositories for PhantomGate
Users that are interested in PhantomGate are comparing it to the libraries listed below
Sorting:
- UAC Bypass using CMSTP in Rust☆33Updated 11 months ago
- Yandex browser password recovery☆11Updated 7 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆64Updated 11 months ago
- Parent Process ID Spoofing, coded in CGo.☆23Updated 6 months ago
- A slightly more fun way to disable windows defender☆46Updated 6 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆56Updated 10 months ago
- In-Memory Rootkit For Linux and BSD☆85Updated 3 months ago
- Attack tool for altering packed samples so that they evade static packing detection☆20Updated 9 months ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 6 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆39Updated 6 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 10 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆66Updated 3 months ago
- Windows And Ways To Break It☆99Updated 2 years ago
- Comprehensive Windows Syscall Extraction & Analysis Framework☆150Updated 2 months ago
- GUI-based UAC bypass☆29Updated 9 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 3 months ago
- .NET tool used to enrich RPC telemetry☆99Updated 4 months ago
- Detonate malware on VMs and get logs & detection status☆60Updated last week
- Memory Obfuscation in Rust☆256Updated last week
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- A command and control framework.☆55Updated 10 months ago
- ☆18Updated last year
- Automated script for obfuscating, rebranding and renaming the Havoc C2 Framework to evade AV/EDR and C2 hunters.☆45Updated 2 months ago
- Build wordlists from the common-crawl index☆11Updated 3 years ago
- A simple Jupyter Notebook to graph a users commit history over time, specifically looking at the author of the xz backdoor.☆21Updated last year
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆94Updated last year
- Microsoft Developer Blogs Search Tool☆24Updated 6 months ago
- A tool for loading and executing PE on Windows and ELF on Linux from memory written in Rust☆12Updated 7 months ago
- Create and enumerate hidden desktops.☆88Updated last year
- Z Anti-Anti-Debugger for Linux☆55Updated 3 months ago