Listening Post for Throwback Implant
☆111Jan 26, 2016Updated 10 years ago
Alternatives and similar repositories for ThrowbackLP
Users that are interested in ThrowbackLP are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTTP/S Beaconing Implant☆311Aug 25, 2017Updated 8 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Executes PowerShell from an unmanaged process☆533Mar 17, 2016Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Impersonate Logged In Accounts & Execute Commands☆35Sep 2, 2014Updated 11 years ago
- Interactive remote PowerShell Payload☆78Jan 21, 2016Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- scrapes Linkedin for company employee profiles☆57Mar 8, 2017Updated 9 years ago
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 13 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A multi-purpose meterpreter executable (inline, many transports, msfpayload)☆81Mar 7, 2018Updated 8 years ago
- PowerShell Module with Security cmdlets for security work☆450Feb 27, 2020Updated 6 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- PowerShell Scripts I find useful☆776May 18, 2016Updated 9 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- ☆26Jul 18, 2017Updated 8 years ago
- Malicious WMI Events using PowerShell☆396Jul 25, 2016Updated 9 years ago
- A shell / chat bot for XMPP and cloud services☆48Oct 10, 2015Updated 10 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PySC - Download shellcode from a remote DNS server (using TXT records) or through Internet Explorer (using SSPI to utilize system-wide p…☆36Dec 27, 2013Updated 12 years ago
- Pentesting Tools☆22Sep 15, 2025Updated 6 months ago
- Advanced HTTP fingerprinting PoC☆45Mar 27, 2017Updated 9 years ago
- This repo is for WMIOps, a powershell script which uses WMI for various purposes across a network.☆388Jun 25, 2024Updated last year
- ☆51Feb 5, 2014Updated 12 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆38Oct 29, 2014Updated 11 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- POC of code that downloads and executes shellcode in memory.☆80May 25, 2014Updated 11 years ago
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆762Jan 28, 2019Updated 7 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Client/server scripts designed to test outbound (egress) firewall rules.☆37Sep 9, 2013Updated 12 years ago
- Common Findings Database☆101Jul 25, 2019Updated 6 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- LD_PRELOAD rootkit utils☆16Jul 3, 2015Updated 10 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆895Aug 20, 2021Updated 4 years ago
- Powershell to CodeExecution and ProcessInjection☆65Jul 18, 2017Updated 8 years ago