1d8 / spybrowse
Code developed to steal certain browser config files (history, preferences, etc)
☆63Updated 4 years ago
Alternatives and similar repositories for spybrowse:
Users that are interested in spybrowse are comparing it to the libraries listed below
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 3 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- ☆51Updated 3 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆31Updated 5 years ago
- Penetration Test / Read Team - C# tools repository☆56Updated 3 years ago
- python hash cracker☆52Updated 2 months ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆75Updated 5 years ago
- Bare Bones Banking malware coded for research & educational purposes☆87Updated 4 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)☆55Updated 3 years ago
- ☆35Updated 3 years ago
- A next generation of ransomware. Fully written using a .Net Framework + C&C System☆38Updated 8 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆37Updated 3 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 5 years ago
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆49Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆43Updated 2 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defender☆37Updated 5 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 2 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆71Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆39Updated 6 years ago
- Custom pentesting tools☆24Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- ☆30Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago