referefref / Rusty-TelephoneLinks
Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC
☆64Updated last year
Alternatives and similar repositories for Rusty-Telephone
Users that are interested in Rusty-Telephone are comparing it to the libraries listed below
Sorting:
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- ☆59Updated last year
- Docker container for running CobaltStrike 4.10☆38Updated last year
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 10 months ago
- Easy peasy file uploads☆33Updated 5 months ago
- ECC Public Key Cryptography☆37Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- ☆42Updated 8 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆46Updated 7 months ago
- Windows Administrator level Implant.☆50Updated last year
- Sh3ller is a lightweight C2 framework in its simplest form.☆32Updated 5 months ago
- A red teaming attack paradigm against AI Agents☆32Updated 10 months ago
- ☆35Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- A small red team course☆40Updated 2 years ago
- Deploy a phishing infrastructure on the fly.☆78Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Updated last year
- Situational Awareness script to identify how and where to run implants☆67Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year
- Permanently disable EDRs as local admin☆125Updated last month
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated 2 years ago
- ☆39Updated 10 months ago
- ☆59Updated last year
- Execute shellcode via ASPNET compiler☆60Updated 4 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆77Updated 2 years ago
- Make an Linux Kernel rootkit visible again.☆59Updated 11 months ago
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆31Updated last year