tanc7 / dark-lord-obamaLinks
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
☆74Updated 3 years ago
Alternatives and similar repositories for dark-lord-obama
Users that are interested in dark-lord-obama are comparing it to the libraries listed below
Sorting:
- PowerShell payload generator☆117Updated 3 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆151Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆77Updated 5 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated last year
- Some random tools I use for penetration testing☆91Updated 4 months ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Koadic C3 COM Command & Control - JScript RAT☆45Updated 8 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆95Updated 4 years ago
- Disable Windows Defender All Version☆32Updated 4 years ago
- A proof-of-concept script to conduct a phishing attack abusing Microsoft 365 OAuth Authorization Flow☆103Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆109Updated last year
- Visual Basic Code universal Obfuscator intended to be used during penetration testing assignments.☆136Updated 3 years ago
- Password Spraying Framework☆63Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 5 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Updated 3 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆23Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- ☆37Updated 3 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- CLI Frontend for PowerShell Empire.☆48Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆101Updated 5 years ago