rek7 / fireELF
fireELF - Fileless Linux Malware Framework
☆657Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for fireELF
- AntiVirus Evasion Tool☆1,651Updated last year
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,225Updated 2 years ago
- HTA encryption tool for RedTeams☆1,371Updated 2 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,377Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆530Updated 2 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,122Updated 3 years ago
- Red Team Tool Kit☆1,111Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆537Updated 3 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆513Updated 3 years ago
- A WebSocket C2 Tool☆387Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,532Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,101Updated 7 years ago
- A Python Package for Data Exfiltration☆763Updated 6 months ago
- Malware sample library.☆558Updated 11 months ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆740Updated 11 months ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆899Updated 3 years ago
- Payload development framework☆565Updated last month
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,197Updated 11 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947Updated 5 years ago
- FCL (Fileless Command Lines) - Known command lines of fileless malicious executions☆462Updated 3 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,481Updated last year
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,309Updated 4 years ago
- Python / C# Unmanaged PowerShell based RAT☆772Updated last year
- PowerShell ReverseTCP Shell - Framework☆1,041Updated 2 years ago
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆1,592Updated 5 years ago
- Easy files and payloads delivery over DNS☆416Updated 7 months ago
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,284Updated 3 years ago
- Windows Event Log Killer☆1,755Updated last year
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆687Updated 4 years ago