skulltech / netmogLinks
A netcat alternative with remote code execution.
☆38Updated 5 years ago
Alternatives and similar repositories for netmog
Users that are interested in netmog are comparing it to the libraries listed below
Sorting:
- recover Firefox and more browsers logins☆50Updated 3 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- python hash cracker☆52Updated 8 months ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆71Updated 5 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- A Linux RAT in C☆35Updated 6 years ago
- Python code injection library☆10Updated 6 years ago
- Reverse shell for remote administration☆31Updated 7 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Updated 2 years ago
- ☆50Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 6 years ago
- Modern problems require modern solutions☆30Updated 2 years ago
- Revrese DNS payload for Metasploit: Download Exec x86 shellcode. Also DNS Handler and VBS bot (alsow working over DNS) as PoC included.☆41Updated 8 years ago
- A way to backdoor every process☆66Updated 7 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- ☆61Updated 2 years ago
- Enumerates users based off RDP Screenshots☆34Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 4 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- -x-x-x-x- DO NOT RUN ON PRODUCTION MACHINE -x-x-x-x- An ELF virus capable of generating segment padded trojans.☆44Updated 3 years ago
- NmapPy - Python implementation of Nmap☆36Updated 6 years ago
- ☆17Updated 5 years ago
- A tool for recover router password☆30Updated 7 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 4 years ago
- A Simple PE File Heuristics Scanners☆50Updated 6 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆73Updated 6 years ago