paranoidninja / SheltreXView external linksLinks
A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3
☆22Jul 21, 2020Updated 5 years ago
Alternatives and similar repositories for SheltreX
Users that are interested in SheltreX are comparing it to the libraries listed below
Sorting:
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆23Jun 7, 2017Updated 8 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- NSA-Proof Secure P2P Chat client☆11Jul 15, 2015Updated 10 years ago
- Latest muhstik release (4.2.2)☆10Mar 25, 2014Updated 11 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆99Dec 19, 2022Updated 3 years ago
- ☆10Mar 29, 2022Updated 3 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆15Apr 8, 2022Updated 3 years ago
- 寻找可注入进程☆13Jul 16, 2020Updated 5 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆24Jan 1, 2021Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 3 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- The NSA wants access to your all your data, might as well make it easier for them to access the backend of your WordPress install. When …☆27Nov 2, 2016Updated 9 years ago
- Bypass AntiVirus with Python and Metasploit using shellcode☆11Mar 25, 2016Updated 9 years ago
- Qbot Source, Scanners, loaders....☆12Jul 2, 2023Updated 2 years ago
- Reduce Dynamic Analysis Detection Rates With Built-In Unhooker, Anti Analysis Techniques, And String Obfuscator Modules.☆21Dec 21, 2022Updated 3 years ago
- Driver reverse engineering of the Russian Sandworm hacking group's BlackEnergy malware.☆19Apr 27, 2021Updated 4 years ago
- Tools for assisting the reverse engineering of Qakbot☆11Jul 21, 2021Updated 4 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Feb 2, 2021Updated 5 years ago
- ☆17Jul 26, 2019Updated 6 years ago
- redteam Build platform☆19Nov 13, 2023Updated 2 years ago
- ☆18Dec 27, 2019Updated 6 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- NSA's IIS 6.0 exploit that creates a remote backdoor.☆19Feb 12, 2019Updated 7 years ago
- ☆24May 28, 2021Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- A Safer PoC for CVE-2022-22965 (Spring4Shell)☆44May 27, 2022Updated 3 years ago
- C# implementation of Shellcode delivery techniques using PInvoke and DInvoke variations for API calling.☆37Dec 20, 2021Updated 4 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- A proof of concept for a clickjacking attack on macOS.☆97Feb 12, 2024Updated 2 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆21Apr 9, 2022Updated 3 years ago
- ☆27Feb 14, 2018Updated 8 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- An example of how x64 kernel shellcode can dynamically find and use APIs☆104May 14, 2020Updated 5 years ago
- CVE-2019-14540 Exploit☆21Aug 21, 2019Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Nov 18, 2019Updated 6 years ago