It's the C version of https://github.com/mthbernardes/sshLooter
☆271Jun 8, 2023Updated 2 years ago
Alternatives and similar repositories for sshLooterC
Users that are interested in sshLooterC are comparing it to the libraries listed below
Sorting:
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- One-click injection into the SSHD process to record and send the password for ssh login☆426Mar 12, 2024Updated 2 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,432Jul 20, 2024Updated last year
- A native backdoor module for Microsoft IIS (Internet Information Services)☆556Jul 3, 2020Updated 5 years ago
- Load shellcode into a new process☆767Jun 2, 2021Updated 4 years ago
- The PowerThIEf, an Internet Explorer Post Exploitation library☆130Feb 27, 2025Updated last year
- GTRS - Google Translator Reverse Shell☆624Sep 26, 2025Updated 5 months ago
- A command shell wrapper using only WMI for Microsoft Windows☆334Jun 24, 2017Updated 8 years ago
- WINDOWS TELEMETRY权限维持☆258Jul 2, 2020Updated 5 years ago
- Some Service DCOM Object and SeImpersonatePrivilege abuse.☆372Dec 9, 2022Updated 3 years ago
- 模拟Cobalt Strike的Beacon与C2通信过程,实现了基于HTTP协议的Linux C2☆141Jun 25, 2020Updated 5 years ago
- anti AV☆291Mar 12, 2020Updated 6 years ago
- A tool to elevate privilege with Windows Tokens☆1,063Oct 6, 2023Updated 2 years ago
- A Golang Reverse Shell Tool With AES Dynamic Encryption☆84Mar 16, 2020Updated 6 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆744Aug 12, 2016Updated 9 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,529Jun 30, 2023Updated 2 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆278Apr 16, 2020Updated 5 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,014Jul 3, 2018Updated 7 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,263Oct 2, 2020Updated 5 years ago
- A Bypass Anti-virus Software Lateral Movement Command Execution Tool☆1,464Jan 20, 2025Updated last year
- a PoC for Linux to get around agents that log commands being executed, without root privilege. Linux低权限模糊化执行的程序名和参数,避开基于execve系统调用监控的命令日志☆245May 8, 2019Updated 6 years ago
- mssqlproxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socke…☆769Feb 16, 2021Updated 5 years ago
- Get teamviewer's ID and password from a remote computer in the LAN☆136Mar 6, 2020Updated 6 years ago
- reGeorg的特殊版本,适用于老版本weblogic。☆151Apr 30, 2020Updated 5 years ago
- TCP Port Redirection Utility☆765Jan 31, 2023Updated 3 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,152May 11, 2022Updated 3 years ago
- Chashell is a Go reverse shell that communicates over DNS. It can be used to bypass firewalls or tightly restricted networks.☆1,082Apr 5, 2022Updated 3 years ago
- generate CobaltStrike's cross-platform payload☆2,547Nov 20, 2023Updated 2 years ago
- Post module for Metasploit to execute ELF in memory☆86Nov 23, 2018Updated 7 years ago
- ☆159Aug 4, 2020Updated 5 years ago
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆117May 2, 2022Updated 3 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- SharpAddDomainMachine☆69Oct 12, 2021Updated 4 years ago
- Beacon.dll reverse☆141Sep 5, 2021Updated 4 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- CobaltStrike Beacon written in .Net 4 用.net重写了stager及Beacon,其中包括正常上线、文件管理、进程管理、令牌管理、结合SysCall进行注入、原生端口转发、关ETW等一系列功能☆729Sep 1, 2021Updated 4 years ago
- CobaltStrike 4.0 - 4.5 Patch☆178Oct 21, 2022Updated 3 years ago
- Steal privileged token to obtain SYSTEM shell☆252Jul 14, 2020Updated 5 years ago