9aylas / Backdooring-ZMM100-FingerPrint-DevicesLinks
AuthBypass & Auto Backdooring Devices
☆15Updated 6 years ago
Alternatives and similar repositories for Backdooring-ZMM100-FingerPrint-Devices
Users that are interested in Backdooring-ZMM100-FingerPrint-Devices are comparing it to the libraries listed below
Sorting:
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 5 years ago
- A collection of open source and commercial tools that aid in red team operations.☆12Updated 7 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 3 weeks ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆30Updated 7 years ago
- All Zero Day Exploits☆21Updated 8 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆12Updated 4 years ago
- A WiFi deauthentication tool written in C☆18Updated 6 years ago
- Python - Metasploit-Framework Database Management☆16Updated 5 years ago
- 😈 The Demon App Store☆30Updated 4 years ago
- An open-source, centralized HTTPS botnet☆77Updated 2 years ago
- ☆53Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆76Updated 3 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Updated 6 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆15Updated 4 years ago
- Collections of way to evade normal detection events.☆23Updated 5 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- WebHook for Red Team☆25Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆23Updated 9 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆18Updated 3 years ago
- python hash cracker☆52Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 8 years ago
- ShockWave looks up for every connected device on the local network, then starts sending deauthentication packets to each of them. It is b…☆27Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆17Updated 5 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 3 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Updated 4 years ago
- 👻👁🔍📡 If an attacker has created a fake enterprise wireless network, my goal is to deceive him.☆18Updated 6 years ago