0dayCTF / ScareCrowLinks
ScareCrow - Payload creation framework designed around EDR bypass.
☆18Updated 2 years ago
Alternatives and similar repositories for ScareCrow
Users that are interested in ScareCrow are comparing it to the libraries listed below
Sorting:
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆76Updated 9 months ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆68Updated 9 months ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆21Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆76Updated 2 years ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- it's a powerful and effective tool for attacking Wi-Fi networks and it supports many different attacks☆19Updated 2 years ago
- Pentesting Suite☆60Updated 6 months ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩 💻☆21Updated 6 years ago
- Generate Malicious QR or similar☆16Updated 2 years ago
- OSINT Google search automation to find emails, names, locations and past breaches information☆19Updated 2 years ago
- Hacking with PasteJacking technique☆22Updated last year
- A Discord bot that searches the dark web for your query and returns links and screenshots of the results to your discord channel using ah…☆113Updated last year
- Clipboard poisoning attack.☆58Updated 5 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Updated 3 years ago
- PassBreaker☆65Updated last year
- HID payloads for good purpose☆10Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆56Updated 4 years ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆21Updated last year
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆55Updated last year
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Updated last year
- Generate wordlists for dictionary attacks☆34Updated 10 months ago
- Simple HTTP listener for security testing☆19Updated 3 years ago
- The Official USB Rubber Ducky Payload Repository☆29Updated 5 months ago
- CamJacking is a tool designed for use in human penetration testing tool. It is intended to simulate potential security threats by testing…☆23Updated last year