pwnwithlove / C_revshell
Basic reverse shell in C using socket() with complete explanation
☆65Updated last year
Related projects ⓘ
Alternatives and complementary repositories for C_revshell
- ☆82Updated 2 years ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆92Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated last month
- Encodes a payload within a generated mock-CSS file☆55Updated last year
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆57Updated 9 months ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆62Updated 2 months ago
- Create Anti-Copy DRM Malware☆46Updated 3 months ago
- Command and Control (C2) framework☆121Updated 7 months ago
- ☆55Updated 7 months ago
- vulnlab.com reaper writeup☆26Updated last year
- Local & remote Windows DLL Proxying☆161Updated 5 months ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆171Updated 10 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last year
- ☆124Updated 3 weeks ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆43Updated 2 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆95Updated last year
- Identify common EDR processes, directories, and services. Simple BOF of Invoke-EDRChecker.☆108Updated last month
- this script adds the ability to encode shellcode (.bin) in XOR,chacha20, AES. You can choose between 2 loaders (Myph / 221b)☆77Updated 11 months ago
- ☆132Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆43Updated last month
- A bunch of scripts and code i wrote.☆131Updated 2 weeks ago
- CVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability☆129Updated last month
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆145Updated 11 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆43Updated last year
- Construct the payload at runtime using an array of offsets☆58Updated 5 months ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆130Updated last year