p4p1 / p4p1_revshellLinks
Reverse shell for remote administration
☆30Updated 7 years ago
Alternatives and similar repositories for p4p1_revshell
Users that are interested in p4p1_revshell are comparing it to the libraries listed below
Sorting:
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30Updated 4 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆42Updated 8 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 8 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- PoC code for crashing windows active directory☆35Updated 7 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- Random stuff☆16Updated 7 years ago
- My Shellcode Archive☆29Updated 8 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- ☆40Updated 7 years ago
- 0x88 exploit pack Decoded☆27Updated 11 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 7 years ago
- "Polymorphic" shellcode generator (x86)☆25Updated 11 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen☆16Updated 5 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆29Updated 6 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- foolav successor - loads DLL, executable or shellcode into memory and runs it effectively bypassing AV☆113Updated 4 years ago