1d8 / spybrowseLinks
Code developed to steal certain browser config files (history, preferences, etc)
☆63Updated 4 years ago
Alternatives and similar repositories for spybrowse
Users that are interested in spybrowse are comparing it to the libraries listed below
Sorting:
- Disable Windows Defender All Version☆31Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆99Updated 4 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- Penetration Test / Read Team - C# tools repository☆57Updated 3 years ago
- A simple "ransomware" using powershell☆14Updated 4 years ago
- ☆52Updated 4 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- Alleged source code leak of Osiris banking trojan☆37Updated 4 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆43Updated 3 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆121Updated 4 years ago
- ☆36Updated 3 years ago
- SMBGhost (CVE-2020-0796) and SMBleed (CVE-2020-1206) Scanner☆46Updated 4 years ago
- Bare Bones Banking malware coded for research & educational purposes☆89Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Updated 4 years ago
- ☆23Updated 5 years ago
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆39Updated 6 years ago
- PowerShell payload generator☆117Updated 3 years ago
- IP addresses exploiting recent log4j2 vulnerability CVE-2021-44228☆16Updated 3 years ago
- Passwordless RDP Session Hijacking☆68Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- A generator for malicious DLL files for DLL Hijacking attacks☆32Updated 5 years ago
- Handy script to automate the attack☆20Updated 5 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18Updated 5 years ago
- A C# DLL to Dump LSA Secrets☆57Updated 7 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 4 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆82Updated last year
- Windows Malware monitors and infects specific kinds of files.☆17Updated 5 years ago