rek7 / fireELFLinks
fireELF - Fileless Linux Malware Framework
☆667Updated 6 years ago
Alternatives and similar repositories for fireELF
Users that are interested in fireELF are comparing it to the libraries listed below
Sorting:
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,128Updated 4 years ago
- A Python Package for Data Exfiltration☆782Updated last year
- swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searc…☆522Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆462Updated 2 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,281Updated 3 years ago
- HTA encryption tool for RedTeams☆1,398Updated 2 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆921Updated 4 years ago
- DNS-Shell is an interactive Shell over DNS channel☆525Updated 4 years ago
- AntiVirus Evasion Tool☆1,704Updated last month
- A WebSocket C2 Tool☆397Updated 7 years ago
- Open source pre-operation C2 server based on python and powershell☆751Updated 3 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,392Updated 4 years ago
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,505Updated last year
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆545Updated 4 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆443Updated last year
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- Payload Development Framework☆752Updated this week
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,615Updated 2 years ago
- CACTUSTORCH: Payload Generation for Adversary Simulations☆1,005Updated 6 years ago
- This is an implementation of a native-code Meterpreter, designed for portability, embeddability, and low resource utilization.☆446Updated 2 weeks ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆949Updated 6 years ago
- Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware. Imaginary C2 hosts a HTTP server which …☆447Updated 2 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆749Updated 6 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆715Updated 6 years ago
- Easy files and payloads delivery over DNS☆422Updated last year
- mXtract - Memory Extractor & Analyzer☆592Updated 3 years ago