ngn13 / ezcat
an easy interface for managing multiple linux & windows TCP reverse shells
โ13Updated this week
Alternatives and similar repositories for ezcat:
Users that are interested in ezcat are comparing it to the libraries listed below
- ๐ฎ INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)โ29Updated last year
- Modular C2 server to tame your pack of wolvesโ12Updated last year
- Self replicating and automatically spreading SSH worm that recovers login credentialsโ51Updated last year
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)โ22Updated 3 years ago
- A utility that can be used to launch an executable with a DLL injectedโ18Updated last year
- A C# Tool to gather information about email breachesโ14Updated last year
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and othersโ11Updated last month
- Malware development: persistence - part 1: startup folder registry keys. C++ implementationโ12Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploitsโ15Updated 6 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.โ12Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps โฆโ24Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.โ21Updated 3 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Adminโ21Updated last year
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.โ40Updated 2 years ago
- Multi-threading wget golangโ13Updated last year
- โ16Updated 2 years ago
- ใ๐ชใThe hidden hookless backdoorโ12Updated 4 months ago
- Parent Process ID Spoofing, coded in CGo.โ22Updated 9 months ago
- Exploit for CVE-2024-3273, supports single and multiple hostsโ13Updated last year
- Local Privilege Escalation Minerโ27Updated 2 years ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offerโฆโ14Updated 5 months ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macroโฆโ23Updated 2 years ago
- Reproducing the SkeletonKey malware.โ11Updated last year
- the assembly shell and backdoor Trojanโ19Updated 3 years ago
- Recon (Whois)โ15Updated last year
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.โ26Updated this week
- โ25Updated last year
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.โ18Updated 3 years ago
- RDP THIEF - inject dll to remote desktop process (mstsc.exe) and steal user credentials.โ13Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research teaโฆโ18Updated 3 years ago