11philip22 / MEGAabuse
uploads unlimited files......... for free
☆12Updated 3 years ago
Alternatives and similar repositories for MEGAabuse:
Users that are interested in MEGAabuse are comparing it to the libraries listed below
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆12Updated 3 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆42Updated 7 years ago
- Multiple Password Generator - Unique Characters, Unique Sequences, Numbers, Uppercase, Lowercase, Symbols, Multiple Generator☆13Updated 7 years ago
- Enter Product Key Volatile Environment LPE☆11Updated last month
- Exploits I've authored☆60Updated 5 years ago
- The GTK Keylogger☆19Updated last year
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- ☆18Updated 4 years ago
- Get/dump chrome and firefox saved passwords.☆19Updated 4 years ago
- Debugger checks in 3 ways☆18Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 2 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆16Updated 6 years ago
- Personal notes☆10Updated 2 years ago
- UIAccess UAC Bypass using token duplication and keyboard events☆25Updated 5 years ago
- Crackme collections☆15Updated 4 years ago
- Silent Monero (XMR) CPU miner☆23Updated 6 years ago
- DarkRats Standalone HVNC☆23Updated 2 years ago
- TaskMgr Volatile Environment LPE☆12Updated last month
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SY…☆15Updated 7 years ago
- ☆13Updated 10 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago