Reverse shell using Windows Registry files (.reg)
☆18Apr 7, 2020Updated 6 years ago
Alternatives and similar repositories for evilreg
Users that are interested in evilreg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Posion: es un script capaz de escanear hosts, MAC spoofing, realizar ataque de SYNflood y sniffear FTP.☆13Jun 23, 2022Updated 3 years ago
- A small and dirty Python 2 decompiler written in Python.☆13Dec 29, 2013Updated 12 years ago
- DrShell is a cutting-edge tool designed for the dynamic management of reverse shell sessions. Whether you are a seasoned security profess…☆17Aug 20, 2025Updated 8 months ago
- Simple class to search and upload files☆28Aug 13, 2019Updated 6 years ago
- Diff plugin for x64dbg☆30Dec 14, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- A Linux shell tool that has multiple tools such as, Instagram Scraper, Phisher, Network Scanner, Port Scanner, Packet Sniffer, Web Scrape…☆25Jan 31, 2023Updated 3 years ago
- ☆12Jun 29, 2021Updated 4 years ago
- Steganography Reverse Shell☆10Apr 22, 2023Updated 3 years ago
- Merge files in one is a Notepad++ plugin☆13Nov 5, 2019Updated 6 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 6 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 3 years ago
- A guide to using The State Decoded, whether deploying a site or using the data from one.☆13Apr 21, 2017Updated 9 years ago
- JS Jscript - download file from url then run it☆58Mar 11, 2020Updated 6 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- light weight dos attack tool to attack to a single port to any network.☆31May 30, 2023Updated 2 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- Install Metasploit-Framework in official way using this script.☆16Feb 6, 2020Updated 6 years ago
- Simple Python Decoders☆12Sep 5, 2020Updated 5 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- SSH brute-forcing tool written in python☆14Feb 10, 2023Updated 3 years ago
- Config files for my GitHub profile.☆14Jan 16, 2024Updated 2 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- AutoIt Analysis Library: Parser & Emulator For Malware Researchers☆21Apr 27, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- Remote Template Injection Toolkit☆49Apr 7, 2024Updated 2 years ago
- Websites Vulnerability Scanner☆81May 27, 2025Updated 11 months ago
- GitHub star history graph☆12Jan 29, 2026Updated 3 months ago
- ☆14Dec 13, 2021Updated 4 years ago
- It can do reverse dns lookups from a range of given IP's or a whole subnet.☆13Apr 19, 2018Updated 8 years ago
- kumpulan project pembuatan shell backdoor☆11Oct 21, 2017Updated 8 years ago
- Termux Setup☆10Jan 17, 2023Updated 3 years ago
- Undetectable payload for Windows 10 and 11☆40Mar 9, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- MajorDoMo Unauthenticated RCE: Deep Dive & Exploitation Techniques☆15Dec 18, 2023Updated 2 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- python command line tool to decrypt and decompile bytecode☆22Nov 7, 2014Updated 11 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆63Aug 17, 2019Updated 6 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- SMS or Network Jam attack By:- Dark_knight☆11Sep 30, 2020Updated 5 years ago