0dayCTF / ScareCrowLinks
ScareCrow - Payload creation framework designed around EDR bypass.
☆14Updated 2 years ago
Alternatives and similar repositories for ScareCrow
Users that are interested in ScareCrow are comparing it to the libraries listed below
Sorting:
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆23Updated 10 months ago
- Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools th…☆51Updated 5 years ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 4 years ago
- Xfinity / Comcast Wordlist Generator☆64Updated 2 years ago
- HID payloads for good purpose☆10Updated 9 months ago
- Clipboard poisoning attack.☆59Updated 5 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆50Updated last year
- Hacking with PasteJacking technique☆22Updated last year
- 🔍 A collection of interesting, funny, and depressing search queries to plug into https://shodan.io/ 👩💻☆21Updated 5 years ago
- Pentesting Suite☆37Updated 2 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆63Updated 5 months ago
- Disconnect all WiFi clients with dedsec tool, you can easily disconnect all WiFi clients from a network. anonymouse mode feature (random …☆20Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- Dogma V1.5.3☆32Updated 5 years ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆56Updated 2 years ago
- Wifi password cracking tool tested (PLDT-Home Wifi)☆47Updated last year
- OSINT Google search automation to find emails, names, locations and past breaches information☆20Updated 2 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆19Updated 3 years ago
- PRECISELY PINPOINT PEDO LOCATION THROUGH THE ART OF SOCIAL ENGINEERING☆24Updated 5 months ago
- Simple HTTP listener for security testing☆16Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆63Updated 4 years ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆49Updated last year
- Python script to perform phishing attacks through captive portals, made for learning purposes☆53Updated 2 years ago
- Remote persistent keylogger for Windows and Linux..☆12Updated 3 years ago
- Make your own rubber ducky USB with VBScript and execute any commands you want!☆32Updated 3 months ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- bash script to automate wardriving tasks. (Wi-Fi & Bluetooth)☆10Updated 2 years ago
- An Automated Database Hacking Software with Database Dorks Hacking☆31Updated 6 years ago
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆35Updated 4 months ago
- ☆13Updated 2 years ago