realaravinth / athena
HTTP based framework for building command and control components for remote access trojans
☆14Updated 3 years ago
Alternatives and similar repositories for athena
Users that are interested in athena are comparing it to the libraries listed below
Sorting:
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 3 years ago
- ☆13Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆24Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- ☆15Updated 2 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 4 years ago
- Abusing autoElevate - Fully Undetectable UAC Bypass exploit☆11Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- ☆18Updated 4 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago
- Trojan written in C++ for Windows☆17Updated last year
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆13Updated 4 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Simple class to search and upload files☆28Updated 5 years ago
- Malware Libraries focused in help Malware Development☆18Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Updated 3 years ago