tanc7 / dark-lord-obamaLinks
AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
☆73Updated 3 years ago
Alternatives and similar repositories for dark-lord-obama
Users that are interested in dark-lord-obama are comparing it to the libraries listed below
Sorting:
- PowerShell payload generator☆117Updated 3 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- Some random tools I use for penetration testing☆89Updated last month
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆67Updated last year
- Disable Windows Defender All Version☆31Updated 4 years ago
- The Diagon Attack Framework is a Prismatica application containing the Ravenclaw, Gryffindor, and Slytherin remote access tools (RATs).☆52Updated 2 years ago
- Aggrokatz is an aggressor plugin extension for Cobalt Strike which enables pypykatz to interface with the beacons remotely and allows it …☆158Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 3 years ago
- Passwordless RDP Session Hijacking☆68Updated 3 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- ☆70Updated 4 years ago
- ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassin…☆31Updated 4 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijacking☆41Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆98Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆99Updated 4 years ago
- An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.☆141Updated 3 years ago
- A Golang implant that uses Slack as a command and control server☆47Updated 4 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆86Updated 5 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Updated 5 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆110Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago