Ping Exfiltration Command and Control (PiX-C2)
☆32May 15, 2015Updated 10 years ago
Alternatives and similar repositories for PiX-C2
Users that are interested in PiX-C2 are comparing it to the libraries listed below
Sorting:
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- Contains poc's and my research works☆31Feb 13, 2023Updated 3 years ago
- ☆25Apr 30, 2021Updated 4 years ago
- ☆15Jul 5, 2020Updated 5 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- A .NET tool that uses AppDomain's to enable dynamic execution and escape detection.☆29Nov 25, 2019Updated 6 years ago
- Outlook addin Back Door☆11Dec 2, 2015Updated 10 years ago
- EternalRomance&Eternalchampion&Eternalblue☆10May 1, 2017Updated 8 years ago
- Microsoft Office 365 EWS (Exchange Web Services) Client Library☆10Jan 7, 2015Updated 11 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Dec 8, 2019Updated 6 years ago
- A simple BOF that disables some logging with NtSetInformationProcess☆14Oct 13, 2023Updated 2 years ago
- ☆13Aug 13, 2019Updated 6 years ago
- Proofs-Of-360Security Sandbox Escape☆10Mar 18, 2022Updated 4 years ago
- VBS Reversed TCP Meterpreter Stager☆88May 25, 2017Updated 8 years ago
- 一个DNS中转服务端,支持自定义域名和IP(DNS欺骗)☆15Jul 19, 2017Updated 8 years ago
- Office365 Tenants List☆16Jun 12, 2018Updated 7 years ago
- ☆54Aug 13, 2018Updated 7 years ago
- Save a screenshot of the Windows desktop from command line☆16Aug 2, 2016Updated 9 years ago
- 一些比较冷门或者特殊的webshell脚本、jar包、war包☆15Oct 14, 2016Updated 9 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- Sniffer vulnerabilities in http request (chrome extension)☆20Feb 17, 2017Updated 9 years ago
- BOF/COFF obj file to PIC(shellcode). by golang☆39Sep 28, 2022Updated 3 years ago
- This repository contains some details about abusing outlook.☆27Aug 17, 2018Updated 7 years ago
- 通过gzip一边压缩一边使用tcp上传文件夹。☆17Nov 12, 2022Updated 3 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆32Nov 17, 2019Updated 6 years ago
- 实战攻击中的badusb脚本☆16Apr 6, 2020Updated 5 years ago
- 窃取mstsc中的用户明文凭据☆47Apr 23, 2021Updated 4 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- MailSniper is a penetration testing tool for searching through email in a Microsoft Exchange environment for specific terms (passwords, i…☆13Nov 4, 2018Updated 7 years ago
- A tool for Windows that can make any program work within file-system transactions.☆59Nov 12, 2020Updated 5 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- Simple reverse ICMP shell☆1,616Apr 6, 2018Updated 7 years ago
- 自己写的Alfred插件,包含时间转换/编解码/hash/ip查询等常用功能☆13Sep 2, 2022Updated 3 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Jun 5, 2023Updated 2 years ago
- (CNVD-2021-26422)亿邮电子邮件系统 远程命令执行漏洞☆12Apr 28, 2021Updated 4 years ago