whiterabb17 / Shamanic
Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays
☆9Updated last year
Related projects ⓘ
Alternatives and complementary repositories for Shamanic
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆23Updated 7 months ago
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆13Updated 3 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆15Updated 2 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- ☆21Updated last year
- Triple OS Malware development framework [ MacOS, Linux & Windows ]☆14Updated last year
- Enumeration & fingerprint tool☆23Updated 8 months ago
- A windows backdoor that's use Telegram as a C2 server.☆14Updated 7 months ago
- Modular C2 server to tame your pack of wolves☆12Updated last year
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆30Updated 5 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 6 months ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- the assembly shell and backdoor Trojan☆17Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 3 months ago
- HTTP based framework for building command and control components for remote access trojans☆12Updated 3 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆36Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 2 years ago
- Automate Blind SQL Injection with Python.☆20Updated 2 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- Modern Cross-Platform Peer-to-Peer Botnet over TOR☆48Updated 2 years ago
- ☆18Updated 10 months ago
- 🚧 C# UAC Bypass technique using mock directories 🚧☆27Updated 2 years ago
- x86_64 LKM linux rootkit☆15Updated last year