Villain
PowerShell-Obfuscation-Bible
Villain | PowerShell-Obfuscation-Bible | |
---|---|---|
2 | 1 | |
3,571 | 685 | |
- | - | |
7.7 | 7.4 | |
about 2 months ago | 5 months ago | |
Python | ||
GNU General Public License v3.0 or later | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Villain
-
Is MSF Venom - Metasploit a good investment for the long run in terms of RATs?
Villain (recommend) https://github.com/t3l3machus/Villain
- Villain - a Windows & Linux backdoor generator and multi-session handler that allows users to connect with sibling servers (other machines running Villain) and share their backdoor sessions, handy for working as a team.
PowerShell-Obfuscation-Bible
What are some alternatives?
hoaxshell - A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
macro_pack - macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify exploitation, antimalware bypass, and automatize the process from malicious macro and script generation to final document generation. It also provides a lot of helpful features useful for redteam or security research.
HavocNotion - A simple ExternalC2 POC for Havoc C2. Communicates over Notion using a custom python agent, handler and extc2 channel. Not operationally safe or stable, built as a PoC to showcase Havoc C2's modular C2 channel interface.
boobsnail - BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.
Pentest-Notes - Collection of Pentest Notes and Cheatsheets from a lot of repos (SofianeHamlaoui,dostoevsky,mantvydasb,adon90,BriskSec)
BypassAV - This map lists the essential techniques to bypass anti-virus and EDR
aizawa - Simple command-line webshell that executes commands via the HTTP request in order to avoid any WAF or IDS while bypassing disable_function.
uuid-loader - UUID based Shellcode loader for your favorite C2
recon - Enumerate a target Based off of Nmap Results
emploleaks - An OSINT tool that helps detect members of a company with leaked credentials
Nebula - Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still working to allow testing other Cloud Providers and DevOps Components.
RecycledInjector - Native Syscalls Shellcode Injector