lillypad / swamp-ratLinks
A Linux RAT in C
☆33Updated 6 years ago
Alternatives and similar repositories for swamp-rat
Users that are interested in swamp-rat are comparing it to the libraries listed below
Sorting:
- ☆31Updated 5 years ago
- Python script to patch the reflective stub in a DLL☆24Updated 8 years ago
- The source code of the SLAE assignments documented at https://rastating.github.io/☆23Updated 6 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30Updated 12 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- Simulates a logged in user.☆16Updated 10 months ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- cobalt strike stuff I have gathered from around github☆31Updated 8 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- ☆17Updated 6 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- A simple injector that uses LoadLibraryA☆18Updated 4 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Simplified version of Forshaw's Diaghub Collector Exploit☆32Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆42Updated 7 years ago
- ☆16Updated 10 years ago
- Apache Module Backdoor (PoC)☆48Updated 6 years ago
- Random source codes☆25Updated 4 years ago
- A Powershell module including a couple of cmdlets for EWS Enum/Exploitation.☆17Updated 5 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- ☆50Updated 4 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 5 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 6 years ago