mazithesage / malvinciView external linksLinks
This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its port through ngrok, and send the URL of the server through a Telegram bot.
☆59Sep 7, 2024Updated last year
Alternatives and similar repositories for malvinci
Users that are interested in malvinci are comparing it to the libraries listed below
Sorting:
- Log4j2 CVE-2021-44228 revshell, ofc it suck!!☆18Dec 21, 2021Updated 4 years ago
- ☆14Mar 7, 2023Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Jul 14, 2024Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- A pure C version of SymProcAddress☆30Mar 17, 2024Updated last year
- Decrypt encrypted passwords in EmailProvider.db on samsung phones.☆13Aug 14, 2017Updated 8 years ago
- PoC of CVE-2022-24707☆13May 3, 2022Updated 3 years ago
- PoC + vulnerability details for CVE-2022-25262 / JetBrains Hub single-click SAML response takeover☆16Jul 5, 2022Updated 3 years ago
- Multi-threaded C2 framework built in Flask with keylogger - from the Offensive C# Course by Naga Sai Nikhil☆21Aug 26, 2022Updated 3 years ago
- ☆52Feb 8, 2024Updated 2 years ago
- Packet crafting, injection and sniffing tool☆70Jan 8, 2026Updated last month
- Hiding shellcode in plain sight within a large memory region. Inspired by technique used by Raspberry Robin's Roshtyak☆209Nov 12, 2025Updated 3 months ago
- ☆133Oct 14, 2022Updated 3 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105May 11, 2022Updated 3 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆34Jul 5, 2022Updated 3 years ago
- vusialization of geo points from photos from vk profile☆48Feb 16, 2022Updated 3 years ago
- ☆17Jun 14, 2023Updated 2 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Apr 27, 2023Updated 2 years ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆270Jan 18, 2023Updated 3 years ago
- ☆86Aug 18, 2022Updated 3 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 6 years ago
- Cobalt Strike profile generator using Jenkins to automate the heavy lifting☆38Feb 20, 2023Updated 2 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Jun 18, 2023Updated 2 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Jun 27, 2023Updated 2 years ago
- ☆163Sep 26, 2023Updated 2 years ago
- 👻 [PoC] CSV+ 0.8.0 - Arbitrary Code Execution (CVE-2022-21241)☆24Feb 11, 2022Updated 4 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- TCP Data Transfer Tool By ClumsyLulz☆12Feb 25, 2023Updated 2 years ago
- A step-by-step walkthrough of how to write a Client and a Driver to communicate with each other and boost the priority of a thread.☆17Dec 12, 2023Updated 2 years ago
- Poshito is a Windows C2 over Telegram☆18Oct 30, 2024Updated last year
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- PowerShell Clipboard Data Transfer☆73Dec 29, 2025Updated last month
- A collection of Windows print spooler exploits containerized with other utilities for practical exploitation.☆551Jul 16, 2021Updated 4 years ago
- SSH Zero-Day Made By ClumsyLulz☆127Jan 7, 2026Updated last month
- Find Microsoft Exchange instance for a given domain and identify the exact version☆188Jan 30, 2023Updated 3 years ago
- CVE-2021-40444☆66Dec 19, 2021Updated 4 years ago