realaravinth / athena
HTTP based framework for building command and control components for remote access trojans
☆14Updated 3 years ago
Alternatives and similar repositories for athena:
Users that are interested in athena are comparing it to the libraries listed below
- Malware Libraries focused in help Malware Development☆18Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 4 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆23Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆19Updated last year
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- ☆14Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆29Updated 2 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated 11 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- ☆13Updated last year
- Simple class to search and upload files☆27Updated 5 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- A simple injector that uses LoadLibraryA☆17Updated 4 years ago
- AMSI Bypass for powershell☆30Updated 2 years ago
- Making Shellcode fully undetectable using uuid☆23Updated 3 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆21Updated 3 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- Tool for obtaining information about PPL processes☆17Updated last year