pwnwithlove / C_revshellLinks
Basic reverse shell in C using socket() with complete explanation
☆67Updated 2 years ago
Alternatives and similar repositories for C_revshell
Users that are interested in C_revshell are comparing it to the libraries listed below
Sorting:
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆144Updated 9 months ago
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆85Updated 8 months ago
- ☆161Updated 7 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆113Updated 2 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆182Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated 2 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year
- A collection of PoCs for different injection techniques on Windows!☆46Updated 2 years ago
- A shellcode injection tool showcasing various process injection techniques☆136Updated last year
- ☆84Updated 3 years ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆107Updated 2 years ago
- Local & remote Windows DLL Proxying☆165Updated last year
- ☆137Updated last year
- Create Anti-Copy DRM Malware☆67Updated last year
- random code snippets, useful for getting started☆121Updated 11 months ago
- Bypass Malware Sandbox Evasion Ram check☆139Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆143Updated 2 years ago
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- ☆85Updated last year
- BSides Prishtina 2024 Malware Development and Persistence workshop☆102Updated 5 months ago
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆105Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆88Updated 8 months ago
- ☆71Updated 7 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆65Updated last year
- ☆107Updated 2 years ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆61Updated 4 months ago
- Convert your shellcode into an ASCII string☆124Updated 4 months ago
- ☆105Updated last year
- Backdooring VSCode Projects☆80Updated 4 months ago