skulltech / netmogLinks
A netcat alternative with remote code execution.
☆38Updated 5 years ago
Alternatives and similar repositories for netmog
Users that are interested in netmog are comparing it to the libraries listed below
Sorting:
- recover Firefox and more browsers logins☆50Updated 3 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- python hash cracker☆52Updated 7 months ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Linux x86_64 Process Injection Utility☆59Updated 4 years ago
- Sources code extracted from malwares for analysis☆37Updated 2 years ago
- ☆30Updated 4 years ago
- ☆43Updated 5 years ago
- Socks Proxy Server Plugin for Invoke-SocksProxy☆17Updated 3 months ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- POC code to crash Windows Event Logger Service☆27Updated 4 years ago
- Botnet Simulation Framework☆77Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆57Updated 3 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15Updated 2 years ago
- ☆50Updated 4 years ago
- adding a backdooruser using win32api☆80Updated 4 years ago
- Intrusion Detection C# app for standlone Windows workstations☆11Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- DO NOT RUN THIS.☆47Updated 3 years ago
- We store attacks and exploits that we've found useful in our research☆13Updated 10 years ago