Ashwesker / Ashwesker-CVE-2025-6389Links
CVE-2025-6389
โ25Updated last month
Alternatives and similar repositories for Ashwesker-CVE-2025-6389
Users that are interested in Ashwesker-CVE-2025-6389 are comparing it to the libraries listed below
Sorting:
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion ๐ทโ84Updated 10 months ago
- ใ๐ก๏ธใAVs/EDRs Evasion toolโ103Updated last year
- PDF dropper Red Team Scenairosโ228Updated last year
- A command and control framework.โ54Updated last year
- Small collection of Active Directory pentesting tools.โ32Updated last year
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSโ59Updated last month
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.โ28Updated 8 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterโ111Updated last year
- Dark-Shell is a Tool for Generating ReverShell Fileโ116Updated 2 months ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin โโ116Updated this week
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.โ46Updated 8 months ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OSยดsโ59Updated 2 years ago
- Polymorphic Command & Controlโ101Updated 10 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.โ87Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.โ112Updated 2 years ago
- ๐ฎ Python Remote administration tool via telegramโ55Updated 8 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keysโ32Updated 3 years ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and โฆโ99Updated last month
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderโ23Updated 3 years ago
- Keklick - C2 Hunting, Reporting and Visualization Toolโ64Updated 5 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.โ58Updated 8 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, aโฆโ27Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagโฆโ117Updated 2 years ago
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.โ153Updated 10 months ago
- Simple Powershell Http shell With WEB UIโ74Updated 9 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmโฆโ144Updated 3 years ago
- Chrome browser extension-based Command & Controlโ226Updated 6 months ago
- ๐ข Multiple Reverse Shell Handler | Stage 0/1 C2 Framework. Enhances Shell functionality and generates obfuscated powershell payload. Supโฆโ17Updated last month
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)โ112Updated 3 months ago
- Windows Privilege Escalationโ70Updated 3 years ago