Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
☆105Dec 28, 2023Updated 2 years ago
Alternatives and similar repositories for covert-tube
Users that are interested in covert-tube are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- ☆18Jun 12, 2025Updated 11 months ago
- PickleC2 is a post-exploitation and lateral movements framework☆98Jul 26, 2021Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆24Feb 17, 2024Updated 2 years ago
- ☆17Dec 16, 2021Updated 4 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆504May 16, 2023Updated 3 years ago
- How to spoof the command line when spawning a new process from C#.☆111Dec 28, 2021Updated 4 years ago
- A tool to analyze Ntds.dit files once the NTLM and LM hashes have been cracked.☆15May 13, 2021Updated 5 years ago
- Source Code Management Attack Toolkit☆13Aug 1, 2022Updated 3 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Repository to gather the .NET malware I will be developing☆18Mar 7, 2026Updated 2 months ago
- ☆539Nov 20, 2021Updated 4 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- Rodan Exploitation Framework☆103Dec 1, 2025Updated 5 months ago
- A PoC for achieving persistence via push notifications on Windows☆49Jun 9, 2023Updated 2 years ago
- Automated Pass-the-Ticket (PtT) attack. Standalone alternative to Rubeus and Mimikatz for this attack. Implemented in C#, C++, Crystal, P…☆133Feb 17, 2026Updated 3 months ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆97Mar 8, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆116Dec 26, 2021Updated 4 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆575Mar 28, 2024Updated 2 years ago
- Monarch - The Adversary Emulation Toolkit☆64Jan 7, 2025Updated last year
- A unique technique to execute binaries from a password protected zip☆1,035Jul 1, 2022Updated 3 years ago
- ☆432Aug 17, 2022Updated 3 years ago
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Easy red team phishing with Puppeteer☆133Feb 6, 2023Updated 3 years ago
- A C2 post-exploitation framework☆488Jan 24, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- exploiting pakistani cnic number to get location and gender behind it☆15Apr 1, 2025Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29May 1, 2018Updated 8 years ago
- Tooling related to the WAM Bam - Recovering Web Tokens From Office blog post☆131Jan 14, 2023Updated 3 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Aug 1, 2021Updated 4 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Hide your payload in DNS☆613May 3, 2023Updated 3 years ago