x3419 / TorgoBotLinks
PoC Remote Administration Tool
☆11Updated 5 years ago
Alternatives and similar repositories for TorgoBot
Users that are interested in TorgoBot are comparing it to the libraries listed below
Sorting:
- Red Team C2 and Post Exploitation code☆36Updated last week
- golang String Obfuscate☆9Updated 3 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Windows privilege escalation Mafia is a framework provides all resources needed for privilege escalation beginners☆12Updated 3 years ago
- Shellcode process injector☆27Updated 5 years ago
- Basic multi platform meterpreter loader module.☆15Updated 4 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 5 years ago
- The best way to send emails in Go.☆10Updated 4 years ago
- ☆17Updated 6 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Updated 3 years ago
- Windows Shellcode Testing Utility to Run Shellcode From A File☆12Updated 5 years ago
- A more advanced free and open .NET obfuscator using dnlib.☆10Updated 2 years ago
- module for certexfil☆15Updated 2 years ago
- L3 proxy backed by Shadowsocks☆10Updated 2 years ago
- Executes shellcode from a remote server and aims to evade in-memory scanners☆31Updated 5 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last month
- Package that provides different PE tricks to difficult the reverse engineering of your Windows applications.☆11Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- ☆14Updated 5 years ago
- Reverse Windows shell over TLS☆19Updated 9 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- Tool scan EternalBlue by golang☆22Updated 5 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated 2 years ago
- Just Enough C2 - A simple but effective server and implant☆9Updated 2 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago