rek7 / fireELF
fireELF - Fileless Linux Malware Framework
☆653Updated 5 years ago
Related projects: ⓘ
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,210Updated 2 years ago
- AntiVirus Evasion Tool☆1,637Updated 11 months ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,118Updated 3 years ago
- HTA encryption tool for RedTeams☆1,362Updated last year
- Tool for extracting information from newly spawned processes☆720Updated 2 years ago
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆510Updated 3 years ago
- ☆2,037Updated this week
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,095Updated 6 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆417Updated last month
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,500Updated last year
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆732Updated 5 years ago
- A Python Package for Data Exfiltration☆754Updated 4 months ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆737Updated 9 months ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆896Updated 3 years ago
- A WebSocket C2 Tool☆380Updated 6 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,479Updated last year
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆446Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆956Updated 6 years ago
- A Golang implant that uses Slack as a command and control server☆457Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆524Updated 3 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,370Updated 4 years ago
- Payload development framework☆556Updated 3 weeks ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆994Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆721Updated 6 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆627Updated last year
- Red Team Tool Kit☆1,106Updated last year
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,173Updated 9 months ago
- kernel privilege escalation enumeration and exploitation framework☆686Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆521Updated 3 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,289Updated 3 years ago