1d8 / CoquiLinks
Bare Bones Banking malware coded for research & educational purposes
☆89Updated 5 years ago
Alternatives and similar repositories for Coqui
Users that are interested in Coqui are comparing it to the libraries listed below
Sorting:
- PowerShell payload generator☆118Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆78Updated 6 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 5 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Updated 5 years ago
- ☆53Updated 4 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Updated 4 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 6 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆42Updated 4 years ago
- powershell tool for VM evasion☆42Updated 5 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- cross-platform C2 framework in python 2☆38Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 4 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆39Updated 2 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- An AV exclusion enumeration tool written in Python.☆60Updated 3 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software☆68Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- ☆37Updated 3 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Tool to manipulate and weaponize Office Open XML documents.☆72Updated 2 years ago
- Super organized and flexible script for sending phishing campaigns☆56Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆119Updated last year
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago