0dayCTF / ScareCrowLinks
ScareCrow - Payload creation framework designed around EDR bypass.
β14Updated 2 years ago
Alternatives and similar repositories for ScareCrow
Users that are interested in ScareCrow are comparing it to the libraries listed below
Sorting:
- π€ The Modern Port Scanner π€β19Updated 4 years ago
- Xfinity / Comcast Wordlist Generatorβ64Updated 2 years ago
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64β23Updated 9 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via β¦β48Updated last year
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools thβ¦β51Updated 4 years ago
- Pentesting Suiteβ35Updated last month
- Social Engineering Browser Update Attack.β57Updated last year
- π A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ π©β π»β21Updated 5 years ago
- This is a exploit with the capability to control ip camera movement even without a username and password.β58Updated 3 months ago
- Hacking with PasteJacking techniqueβ22Updated last year
- Simple HTTP listener for security testingβ16Updated 2 years ago
- OSINT Google search automation to find emails, names, locations and past breaches informationβ20Updated 2 years ago
- HID payloads for good purposeβ10Updated 7 months ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Frameworβ¦β26Updated 3 months ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. β¦β48Updated last year
- An efficient tool To Find click jacking vulnerabilities in easiest way with pocβ25Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple wayβ39Updated last year
- β13Updated 2 years ago
- Clipboard poisoning attack.β58Updated 5 years ago
- Who We Areβ19Updated 11 months ago
- Dogma V1.5.3β30Updated 5 years ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ42Updated 2 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.β48Updated 2 years ago
- Browse the web entirely over SMS β no apps required.β8Updated 10 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)β10Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β63Updated 4 years ago
- steal chrome saved passwords "undetectable"β51Updated 3 years ago
- A windows post exploitation tool that contains a lot of features for information gathering and more.β47Updated 4 years ago
- PassBreakerβ63Updated last year
- An Effiecent Tool To Change Tor IP's in Seconds,change mac address and clean all logsβ36Updated 3 years ago