paranoidninja / SheltreXLinks
A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3
☆23Updated 5 years ago
Alternatives and similar repositories for SheltreX
Users that are interested in SheltreX are comparing it to the libraries listed below
Sorting:
- Bare Bones Banking malware coded for research & educational purposes☆88Updated 5 years ago
- A simple injector that uses LoadLibraryA☆18Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, Pro…☆22Updated 4 years ago
- PowerShell payload generator☆117Updated 3 years ago
- powershell tool for VM evasion☆42Updated 4 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆40Updated 4 years ago
- Disable Windows Defender All Version☆32Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated last year
- Sp00fer blog post -☆26Updated 3 years ago
- ☆37Updated 3 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆37Updated last year
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆77Updated 5 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆74Updated 3 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆58Updated 3 years ago
- Antiscan.me automatization script☆30Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- Curated list of well-developed C# Offensive Tools☆20Updated 5 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆25Updated 3 years ago
- The Hunt for Malicious Strings☆13Updated 4 years ago