skulltech / netmogLinks
A netcat alternative with remote code execution.
☆38Updated 5 years ago
Alternatives and similar repositories for netmog
Users that are interested in netmog are comparing it to the libraries listed below
Sorting:
- HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.☆251Updated 4 years ago
- python hash cracker☆52Updated last year
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 3 years ago
- Passwords Recovery Tool☆229Updated 4 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆72Updated 6 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆95Updated 4 years ago
- PoC about CVE-2019-0708 (RDP; Windows 7, Windows Server 2003, Windows Server 2008)☆39Updated 6 years ago
- ☆50Updated 5 years ago
- import pyd or execute PE all from memory using only pure python code and some shellcode tricks☆73Updated 8 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Updated last year
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- Tool to brute website sub-domains and dirs.☆49Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆256Updated 2 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- Python library and client for token manipulations and impersonations for privilege escalation on Windows☆124Updated 3 years ago
- Linux x86_64 Process Injection Utility☆58Updated 4 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆126Updated 2 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- ☆43Updated 6 years ago
- ☆61Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆45Updated 3 years ago
- A way to backdoor every process☆68Updated 8 years ago