9aylas / Backdooring-ZMM100-FingerPrint-DevicesLinks
AuthBypass & Auto Backdooring Devices
☆16Updated 6 years ago
Alternatives and similar repositories for Backdooring-ZMM100-FingerPrint-Devices
Users that are interested in Backdooring-ZMM100-FingerPrint-Devices are comparing it to the libraries listed below
Sorting:
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 5 years ago
- Zero-Day Vulnerability in File Manager Plugin 6.7 ( CVE 2020-25213 )☆12Updated 2 years ago
- Simple Wi-Fi Keylogger with multiple layout support.☆27Updated 6 years ago
- All-in-One Ransomware Decryption Tools (Unofficial Mirror)☆51Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- Python - Metasploit-Framework Database Management☆15Updated 5 years ago
- Repository of tools used in my blog☆52Updated last year
- ☆53Updated 4 years ago
- A dysfunctional framework for software analysis by black hat hackers who intend to develop Cerberus, the malicious banking trojan botnet …☆14Updated 3 years ago
- Advanced Spear Phishing tool for Facebook with 2 factor authentication bypass! May contain minor bugs due to...idk☆53Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 2 months ago
- A WiFi deauthentication tool written in C☆18Updated 6 years ago
- The best game bot for mobile game vHack OS. It completely automates your game. So do not hesitate and download and play 24/7 like everyon…☆18Updated 7 years ago
- All Zero Day Exploits☆20Updated 7 years ago
- Spider or repeater to find all links.☆12Updated 4 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 9 years ago
- Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected☆26Updated 6 years ago
- Anubis 7.0☆27Updated 11 months ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.☆14Updated 3 years ago
- Arduino based device for reading Mifare cards from a distance using RC522 module and an OLED display for portable reading of card data.☆19Updated 6 years ago
- pen testing scripts☆12Updated 4 years ago
- IRC based botnet developed in C☆44Updated 8 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 5 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆78Updated 2 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣☆37Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆25Updated 4 years ago
- CCTV Camera scanner using the GoAhead webserver exploit☆17Updated 4 months ago