pwnwithlove / C_revshell
Basic reverse shell in C using socket() with complete explanation
☆65Updated last year
Alternatives and similar repositories for C_revshell:
Users that are interested in C_revshell are comparing it to the libraries listed below
- Using the Counter Strike 1.6 RCON protocol as a C2 Channel.☆68Updated this week
- Create Anti-Copy DRM Malware☆52Updated 6 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆98Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆63Updated 4 months ago
- A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders Stardust☆83Updated 10 months ago
- Local & remote Windows DLL Proxying☆162Updated 8 months ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆65Updated 3 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆137Updated last month
- A bunch of scripts and code i wrote.☆134Updated 3 months ago
- ☆57Updated last year
- Command and Control (C2) framework☆124Updated 10 months ago
- Stage 0☆153Updated 2 months ago
- ☆84Updated 2 years ago
- This project is an implant framework designed for long term persistent access to Windows machines.☆109Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆144Updated 9 months ago
- Encodes a payload within a generated mock-CSS file☆59Updated last year
- An updated version of keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard in…☆103Updated last year
- I have created these custom servers for preparing EXP-301 course (aka WUMED) exam and hope it will help to take OSED certification. Feel …☆45Updated last year
- A variation of ProcessOverwriting to execute shellcode on an executable's section☆147Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆104Updated 10 months ago
- A python script to automatically list vulnerable Windows ACEs/ACLs.☆48Updated 2 months ago
- Bypass the Event Trace Windows(ETW) and unhook ntdll.☆102Updated last year
- Just another C2 Redirector using CloudFlare.☆86Updated 9 months ago
- Construct the payload at runtime using an array of offsets☆61Updated 8 months ago
- ☆107Updated last year
- Bypass Malware Sandbox Evasion Ram check☆136Updated 2 years ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆67Updated 5 months ago