pwnwithlove / C_revshell
Basic reverse shell in C using socket() with complete explanation
☆65Updated last year
Alternatives and similar repositories for C_revshell:
Users that are interested in C_revshell are comparing it to the libraries listed below
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆74Updated last month
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 5 months ago
- ☆84Updated 2 years ago
- Local & remote Windows DLL Proxying☆162Updated 9 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆99Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆138Updated 2 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆39Updated last year
- Command and Control (C2) framework☆126Updated 11 months ago
- ☆137Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- Create Anti-Copy DRM Malware☆54Updated 7 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆50Updated 3 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 10 months ago
- ☆58Updated last year
- ☆63Updated 11 months ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆129Updated 4 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆84Updated 11 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 9 months ago
- ☆60Updated last week
- Situational Awareness script to identify how and where to run implants☆48Updated 3 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- Bypass AMSI By Dividing files into multiple smaller files☆45Updated 2 years ago
- ☆38Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆86Updated last year
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆80Updated last year
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆82Updated last year
- Stage 0☆154Updated 3 months ago
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year