whiterabb17 / ShamanicLinks
Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays
☆13Updated 2 years ago
Alternatives and similar repositories for Shamanic
Users that are interested in Shamanic are comparing it to the libraries listed below
Sorting:
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- Command and Control (C2) framework☆132Updated 8 months ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 9 months ago
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆133Updated last year
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆103Updated last month
- This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing grea…☆13Updated 2 years ago
- Offensive Powershell obfuscator☆27Updated last year
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆41Updated last month
- Monarch - The Adversary Emulation Toolkit☆63Updated last year
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆152Updated last year
- This is way to load a shellcode, and obfuscate it, so it avoids scantime detection.☆90Updated 9 months ago
- This project will guide yout to awareness of injection in almost every window API and process.☆24Updated 3 years ago
- Evasive Golang Loader☆137Updated last year
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆204Updated last year
- Mangle is a tool that manipulates aspects of compiled executables (.exe or DLL) to avoid detection from EDRs☆105Updated 3 years ago
- 「💀」Proof of concept on BYOVD attack☆165Updated last year
- Rust malware EDR evasion via direct syscalls, fully implemented as an example in Rust☆82Updated last year
- An interactive mock C2 server☆17Updated 2 years ago
- Windows Privilege Escalation Tool☆18Updated last month
- Using fibers to run in-memory code.☆240Updated 2 years ago
- Rust in-memory dumper☆108Updated 2 years ago
- REC2 (Rusty External Command and Control) is client and server tool allowing auditor to execute command from VirusTotal and Mastodon APIs…☆163Updated last year
- The best powershell obfuscator ever made☆119Updated 6 months ago
- RedLizard Rust TCP Reverse Shell Server/Client☆139Updated 2 years ago
- KittyStager is a simple stage 0 C2. It is made of a web server to host the shellcode and an implant, called kitten. The purpose of this p…☆229Updated 2 years ago
- Polymorphic ELF Virus☆18Updated 3 years ago
- Red Team Operation's Defense Evasion Technique.☆56Updated last year
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆22Updated 2 years ago