nyxgeek / dirdevil
hiding in plain sight: part 2
☆46Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for dirdevil
- ☆11Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆15Updated 2 months ago
- ☆35Updated 11 months ago
- Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode☆51Updated last month
- Cerez 😈 LD_PRELOAD rootkit☆22Updated last year
- ☆50Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 3 months ago
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆40Updated 11 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆80Updated 9 months ago
- Repo for all my exploits/PoCs☆27Updated 2 months ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆74Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆81Updated 10 months ago
- RCE PoC for Empire C2 framework <5.9.3☆26Updated 9 months ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆40Updated last year
- exfiltration/infiltration toolkit☆23Updated 11 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆51Updated last year
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆35Updated 2 months ago
- PowerShell script to generate ShellCode in various formats☆39Updated 2 months ago
- ☆25Updated last year
- ECC Public Key Cryptography☆36Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆63Updated 6 months ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 8 months ago
- Make an Linux Kernel rootkit visible again.☆44Updated last month
- AES-256 Microsoft Cryptography API Example Use.☆29Updated last year
- Docker container for running CobaltStrike 4.10☆33Updated 2 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆32Updated this week
- A C2 framework built for my bachelors thesis☆53Updated 3 weeks ago
- ☆37Updated last month