mthbernardes / sshLooterCLinks
It's the C version of https://github.com/mthbernardes/sshLooter
☆266Updated last year
Alternatives and similar repositories for sshLooterC
Users that are interested in sshLooterC are comparing it to the libraries listed below
Sorting:
- Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322☆350Updated 5 years ago
- Bluekeep(CVE 2019-0708) exploit released☆105Updated 5 years ago
- Cobalt Strike Python API☆300Updated 3 years ago
- Shellcode wrapper with encryption for multiple target languages☆440Updated 8 years ago
- cve-2020-0688☆324Updated last year
- A native backdoor module for Microsoft IIS (Internet Information Services)☆543Updated 4 years ago
- A script to randomize Cobalt Strike Malleable C2 profiles and reduce the chances of flagging signature-based detection controls☆447Updated 2 years ago
- ntlm relay attack to Exchange Web Services☆333Updated 7 years ago
- SimpleShellcodeInjector receives as an argument a shellcode in hex and executes it. It DOES NOT inject the shellcode in a third party ap…☆256Updated 4 years ago
- ☆295Updated 4 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆443Updated last year
- Some useful scripts for CobaltStrike☆846Updated 4 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆740Updated 8 years ago
- A backdoor module for Apache2☆198Updated 5 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆175Updated 4 years ago
- A proof of concept for the RDP Inception Attack☆348Updated 7 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆342Updated 4 years ago
- Aggressor Script, Kits, Malleable C2 Profiles, External C2 and so on☆556Updated 2 years ago
- Search Exploitable Software on Linux☆228Updated 2 years ago
- Convert Cobalt Strike profiles to modrewrite scripts☆604Updated 2 years ago
- Evading Anti-Virus with Unusual Technique☆215Updated 2 years ago
- CVE-2018-8581☆372Updated 2 years ago
- Hershell is a simple TCP reverse shell written in Go.☆531Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,005Updated 6 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆241Updated 5 years ago
- Aggressor scripts I've made for Cobalt Strike☆407Updated last year
- Public work for CVE-2019-0708☆292Updated 5 years ago
- A WebSocket C2 Tool☆397Updated 7 years ago