referefref / Rusty-TelephoneLinks
Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC
☆62Updated 10 months ago
Alternatives and similar repositories for Rusty-Telephone
Users that are interested in Rusty-Telephone are comparing it to the libraries listed below
Sorting:
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆71Updated 2 months ago
- ECC Public Key Cryptography☆37Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated last year
- ☆38Updated 4 months ago
- Sh3ller is a lightweight C2 framework in its simplest form.☆31Updated last month
- ☆59Updated 11 months ago
- Mythic C2 wrapper for NimSyscallPacker☆25Updated 7 months ago
- BypassIT is a framework for covert malware delivery and post-exploitation using AutoIT for red / blue team self assessment.☆43Updated 3 months ago
- Windows Administrator level Implant.☆49Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆89Updated 2 months ago
- POC of GITHUB simple C2 in rust☆52Updated 3 months ago
- BeaconatorC2 is a framework for red teaming and adversarial emulation, providing a full-featured management interface, along with a catal…☆83Updated last week
- Deploy a phishing infrastructure on the fly.☆76Updated 10 months ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- A robust command-line tool built in Rust that makes merging and deduplicating text files a breeze. Whether you're dealing with small file…☆19Updated last month
- ☆58Updated last year
- ☆35Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆41Updated 9 months ago
- Lifetime AMSI bypass.☆35Updated 6 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆23Updated 9 months ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆51Updated 7 months ago
- Backdooring VSCode Projects☆79Updated 4 months ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated 11 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 9 months ago
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆40Updated last year
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Updated 2 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Updated last year