11philip22 / MEGAabuse
uploads unlimited files......... for free
☆12Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for MEGAabuse
- Warning! Don't run this code on your computer.☆15Updated 5 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Enter Product Key Volatile Environment LPE☆11Updated 2 years ago
- Uses NASM Shell Tool from Metasploit to friendly export Python / C / CPP shellcode from assembly instructions.☆15Updated 4 years ago
- TaskMgr Volatile Environment LPE☆12Updated 2 years ago
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 6 years ago
- This is the ToRat client, a part of the ToRat Project.☆26Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆26Updated 6 years ago
- Reverse Windows shell over TLS☆18Updated 8 years ago
- Monitor Files and Folders for Changes in Real Time .☆10Updated 5 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆27Updated 5 years ago
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆41Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Crackme collections☆15Updated 4 years ago
- Debugger checks in 3 ways☆20Updated 6 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- x86 and x86-64 shellcodes for Windows, Mac OSX, Linux, BSD and Solaris☆15Updated 7 years ago
- A script for SOC operators' first analysis. Add new player in the game.☆8Updated 2 years ago
- An advanced keylogger with a GUI redirects traffic via TOR, designed to be executed on unix operating systems☆13Updated 3 years ago
- Some of CrackMes made by me :)☆17Updated 2 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆18Updated 3 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- The GTK Keylogger☆19Updated last year