ngn13 / ezcatLinks
an easy interface for managing multiple linux & windows TCP reverse shells
☆15Updated 3 months ago
Alternatives and similar repositories for ezcat
Users that are interested in ezcat are comparing it to the libraries listed below
Sorting:
- Self replicating and automatically spreading SSH worm that recovers login credentials☆52Updated last year
- A C# Tool to gather information about email breaches☆14Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆47Updated 2 months ago
- Firefox webInjector capable of injecting codes into webpages using a mitmproxy.☆41Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆15Updated 3 years ago
- Parent Process ID Spoofing, coded in CGo.☆22Updated 2 months ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 2 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 2 months ago
- Dump Linux keyrings☆20Updated last year
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆12Updated 2 months ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆27Updated 2 years ago
- A payload delivery system which embeds payloads in an executable's icon file!☆74Updated last year
- A command and control (C2) server☆57Updated last year
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆13Updated 3 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17Updated last year
- 🌮 INTERACTIVE reverse shell everywhere! (Particularly digestible with socat multi-handler listener)☆30Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 7 months ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆15Updated 4 years ago
- ☆29Updated last year
- PDF Icon File Type Spoofer☆16Updated last year
- Recursively extract urls from a web page for reconnaissance.☆12Updated last year
- Inject shellcode into a valid BMP/GIF image.☆30Updated 4 years ago
- Ransomware written in go, encrypt - decrypt.☆25Updated 2 months ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆117Updated last year
- ☆25Updated 7 months ago
- A Documentation for my module PS2BAT, it converts Powershell Scripts to Batchfile ones.☆11Updated 2 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago