0xperator / hookbot_sourceLinks
This repository contains a few leaked files of HookBot.
☆105Updated 2 years ago
Alternatives and similar repositories for hookbot_source
Users that are interested in hookbot_source are comparing it to the libraries listed below
Sorting:
- Here are +200 different rats some with source code☆112Updated last year
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 11 months ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆184Updated last year
- Windows And Ways To Break It☆100Updated last year
- ProxyChecker Made in NodeJS☆37Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆138Updated 3 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆65Updated 11 months ago
- Telegram video (mp4) extension manipulation PoC☆95Updated 5 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- 🔮 Python Remote administration tool via telegram☆52Updated 4 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆70Updated 4 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆82Updated 3 months ago
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆99Updated 10 months ago
- Scripts to set up your own Android 📱 app hacking lab☆88Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- hiding in plain sight: part 2☆45Updated last year
- Capture screenshots of onion services on an onion service.☆71Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated 2 years ago
- What is Phone Track? So phonetrack is a type of OSINT that is used to track someone's location just based on their telephone number☆77Updated last year
- Persistent Powershell backdoor tool {😈}☆119Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Android malware source code dataset collected from public resources.☆109Updated 2 years ago
- Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely☆72Updated last year
- ☆102Updated last year
- Limbo is a Python-based malware that collects sensitive data from a user's computer, such as passwords and system information. It is int…☆48Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year