whiterabb17 / ShamanicLinks
Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays
☆11Updated 2 years ago
Alternatives and similar repositories for Shamanic
Users that are interested in Shamanic are comparing it to the libraries listed below
Sorting:
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated 8 months ago
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆47Updated 2 years ago
- Windows Privilege Escalation Tool☆18Updated last year
- Offensive Powershell obfuscator☆27Updated 11 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆50Updated 4 months ago
- A Flask-based HTTP(S) command and control (C2) framework with a web interface. Custom Windows EXE/DLL implants written in C++. For educat…☆92Updated last year
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆17Updated 9 months ago
- eXtensiable Malware Toolkit: Full Featured Golang C2 Framework with Awesome Features☆99Updated last month
- A Golang Discord C2 unlike any other. DCVC2 uses RTP packets over a voice channel to transmit all data leaving no operational traces in t…☆132Updated 9 months ago
- privilege escalation POCs built in Rust.☆19Updated 3 years ago
- C2 Server for pentesting, exploitation, and payload creation☆12Updated last year
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 3 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Updated 3 years ago
- A Golang shellcode loader that receives payloads via ICMP packets from a C2 server to bypass firewalls☆19Updated 2 years ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Updated 2 years ago
- Polymorphic ELF Virus☆17Updated 3 years ago
- Modular C2 server to tame your pack of wolves☆19Updated last week
- Bypass Malware Sandbox Evasion Ram check☆138Updated 2 years ago
- Pure Go rewrite of knockknock☆11Updated 2 years ago
- Golang C2 Server and Agents using XMT (https://github.com/iDigitalFlame/xmt)☆39Updated 9 months ago
- A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)☆24Updated 2 years ago
- Command and Control (C2) framework☆130Updated 3 months ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆38Updated last year
- Scripts permettant de contourner la protection antivirale de Windows Defender via la technique de Direct Syscalls avec une injection de s…☆30Updated 2 years ago
- Ransomware written in go, encrypt - decrypt.☆27Updated 4 months ago
- Caddy v2 module to filter requests based on C2 profiles☆15Updated 4 months ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆203Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆71Updated last year