ricardojoserf / covert-tubeView external linksLinks
Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube
☆107Dec 28, 2023Updated 2 years ago
Alternatives and similar repositories for covert-tube
Users that are interested in covert-tube are comparing it to the libraries listed below
Sorting:
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- ☆17Jun 12, 2025Updated 8 months ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆69Oct 31, 2021Updated 4 years ago
- Backdoored Electron app.asar☆17Jun 11, 2021Updated 4 years ago
- How to spoof the command line when spawning a new process from C#.☆110Dec 28, 2021Updated 4 years ago
- ☆17Dec 16, 2021Updated 4 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Apr 19, 2021Updated 4 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Execute Mimikatz with different technique☆51Nov 8, 2021Updated 4 years ago
- Rodan Exploitation Framework☆103Dec 1, 2025Updated 2 months ago
- exploiting pakistani cnic number to get location and gender behind it☆14Apr 1, 2025Updated 10 months ago
- Monarch - The Adversary Emulation Toolkit☆63Jan 7, 2025Updated last year
- Just another casual shellcode native loader☆25Feb 3, 2022Updated 4 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Dec 26, 2021Updated 4 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆93Mar 8, 2023Updated 2 years ago
- Azure Outlook Command & Control (C2) - Remotely control a compromised Windows Device from your Outlook mailbox. Threat Emulation Tool for…☆503May 16, 2023Updated 2 years ago
- Easy red team phishing with Puppeteer☆132Feb 6, 2023Updated 3 years ago
- ☆539Nov 20, 2021Updated 4 years ago
- A C2 post-exploitation framework☆482Jan 24, 2024Updated 2 years ago
- Create fake certs for binaries using windows binaries and the power of bat files☆572Mar 28, 2024Updated last year
- Unhooks Bit Defender from NTDLL and KERNELBASE using a classic technique.☆57Jun 23, 2023Updated 2 years ago
- A PoC for achieving persistence via push notifications on Windows☆48Jun 9, 2023Updated 2 years ago
- Search-Registry: Find Keys, Value Names, and Value Data in the Registry☆11Jul 3, 2022Updated 3 years ago
- C# implementation of Out-Minidump.ps1☆10Jul 13, 2018Updated 7 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- 🌈 Render PowerShell in the Terminal with Syntax Highlighting☆10May 25, 2023Updated 2 years ago
- 一款用于记录终端软件使用时间的开发套件☆12Feb 26, 2022Updated 3 years ago
- Roast in the Middle☆295Sep 19, 2025Updated 4 months ago
- A User Impersonation tool - via Token or Shellcode injection☆422May 21, 2022Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆458Oct 25, 2021Updated 4 years ago
- ☆432Aug 17, 2022Updated 3 years ago
- RefleXXion is a utility designed to aid in bypassing user-mode hooks utilised by AV/EPP/EDR etc. In order to bypass the user-mode hooks, …☆502Jan 25, 2022Updated 4 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- VM for OSINT investigators that is a test-bed for using AI tools and agents to improve investigations. No out-of-date and unmaintained t…☆17May 2, 2025Updated 9 months ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- ☆12Jul 13, 2023Updated 2 years ago