skulltech / netmog
A netcat alternative with remote code execution.
☆38Updated 5 years ago
Alternatives and similar repositories for netmog:
Users that are interested in netmog are comparing it to the libraries listed below
- recover Firefox and more browsers logins☆49Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆39Updated 3 years ago
- A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges.☆42Updated 6 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆45Updated 2 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 4 years ago
- Sources code extracted from malwares for analysis☆36Updated 2 years ago
- ☆42Updated 5 years ago
- A proof-of-concept DLL that prints out the password a user enters into Veracrypt while decrypting a volume.☆15Updated 6 years ago
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 3 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- POC code to crash Windows Event Logger Service☆26Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 4 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- python hash cracker☆52Updated 5 months ago
- Handy script to automate the attack☆20Updated 5 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- Reverse shell for remote administration☆30Updated 7 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- A POC C2 server and agent to explore just if/how the Ethereum blockchain can be used for C2☆74Updated 6 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- DDoor - cross platform backdoor using dns txt records☆30Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- backdorOS is an in-memory OS written in Python 2.7 with a built-in in-memory filesystem, hooks for open() calls and imports, Python REPL …☆68Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆98Updated 3 years ago
- Automation Capable Multi Search 64 Bit Windows Memory Scanner☆28Updated 4 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆54Updated 3 years ago
- A simple yet beautiful phishing proxy.☆54Updated 3 years ago