PoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers
☆369May 22, 2023Updated 2 years ago
Alternatives and similar repositories for SMShell
Users that are interested in SMShell are comparing it to the libraries listed below
Sorting:
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆373Apr 6, 2024Updated last year
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆738May 19, 2023Updated 2 years ago
- Weaponized HellsGate/SigFlip☆203Jun 7, 2023Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆377Dec 5, 2023Updated 2 years ago
- Splitting and executing shellcode across multiple pages☆103Jun 8, 2023Updated 2 years ago
- elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative☆382Nov 2, 2023Updated 2 years ago
- An interactive shell to spoof some LOLBins command line☆188Jan 27, 2024Updated 2 years ago
- kill anti-malware protected processes ( BYOVD )☆968Jul 21, 2023Updated 2 years ago
- ☆162Oct 25, 2023Updated 2 years ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆260Jun 14, 2023Updated 2 years ago
- Lateral Movement☆125Nov 14, 2023Updated 2 years ago
- ☆189Jan 23, 2024Updated 2 years ago
- JavaScript payload and supporting software to be used as XSS payload or post exploitation implant to monitor users as they use the target…☆418Jan 31, 2026Updated 3 weeks ago
- ☆38Apr 7, 2023Updated 2 years ago
- Fileless Command Execution for Lateral Movement in Nim☆389Dec 12, 2023Updated 2 years ago
- Docker Remote API Scanner and Exploit☆179Nov 13, 2023Updated 2 years ago
- ☆307Mar 15, 2025Updated 11 months ago
- ☆290Jul 20, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆389Jun 21, 2023Updated 2 years ago
- Native Syscalls Shellcode Injector☆266Jul 2, 2023Updated 2 years ago
- MultiPlatform HTTP Reverse Shell☆242Dec 31, 2025Updated 2 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Nov 12, 2023Updated 2 years ago
- ☆568Mar 28, 2024Updated last year
- RCE PoC for Empire C2 framework <5.9.3☆28Feb 24, 2024Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,198Oct 16, 2023Updated 2 years ago
- ☆79Aug 2, 2023Updated 2 years ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 10 months ago
- Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel.☆242Sep 26, 2023Updated 2 years ago
- Reverse shell that can bypass windows defender detection☆170Feb 3, 2024Updated 2 years ago
- Extract C2 Traffic☆253Nov 25, 2024Updated last year
- Cobalt Strike HTTPS beaconing over Microsoft Graph API☆622Jun 25, 2024Updated last year
- Powershell tools used for Red Team / Pentesting.☆81Jan 8, 2024Updated 2 years ago
- HVNC for Cobalt Strike☆1,298Dec 7, 2023Updated 2 years ago
- Custom Binary Ninja Themes☆12Nov 11, 2023Updated 2 years ago
- A tool to spray Shadow Credentials across an entire domain in hopes of abusing long forgotten GenericWrite/GenericAll DACLs over other ob…☆483Oct 14, 2022Updated 3 years ago
- Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST☆721Aug 18, 2023Updated 2 years ago
- Analyse your malware to surgically obfuscate it☆519Dec 17, 2025Updated 2 months ago