11philip22 / MEGAabuse
uploads unlimited files......... for free
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for MEGAabuse
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆15Updated 6 years ago
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- A simple AES malware crypter☆16Updated 6 years ago
- Hash Checker Bypass and Process Hacker☆17Updated 3 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- using the Recycle Bin to insure persistence☆11Updated 2 years ago
- Access windows machine remotely on HTTP☆12Updated 4 years ago
- TaskMgr Volatile Environment LPE☆12Updated 2 years ago
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆35Updated 9 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆18Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- ☆13Updated 9 years ago
- A PoC to show how to add code to C# and dotNet and make it reusable for Red Team operations. Maybe one day it will be the largest collect…☆17Updated 4 years ago
- A simple polymorphic engine☆21Updated 4 years ago
- JSBatchDeobfuscator but in C#☆9Updated 4 years ago
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 6 years ago
- The GTK Keylogger☆19Updated last year
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago