whiterabb17 / Shamanic
Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays
☆9Updated 2 years ago
Alternatives and similar repositories for Shamanic
Users that are interested in Shamanic are comparing it to the libraries listed below
Sorting:
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 11 months ago
- Windows Privilege Escalation Tool☆18Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆24Updated 5 months ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆16Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆12Updated 3 weeks ago
- the assembly shell and backdoor Trojan☆19Updated 3 years ago
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- lightweight http redirector written in nim☆11Updated 2 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 3 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Malware Libraries focused in help Malware Development☆18Updated 2 years ago
- ☆25Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 10 months ago
- HTTP based framework for building command and control components for remote access trojans☆14Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆37Updated 6 months ago
- SecretSmasher is a Red Team tool used for brute-forcing Cisco enable passwords☆13Updated 5 years ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Updated 2 years ago
- miscellaneous sploit scripts/hacks☆16Updated 3 months ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 4 years ago
- Malware development in Go, learn today, anti dynamic analysis & Static & sandboxes.☆12Updated 3 weeks ago
- Automate Blind SQL Injection with Python.☆21Updated 2 years ago
- Red Team C2 and Post Exploitation Code☆36Updated 2 months ago
- Offensive Powershell obfuscator☆27Updated 8 months ago
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆14Updated 5 months ago
- Enumeration & fingerprint tool☆24Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Updated 4 years ago