Ashwesker / Ashwesker-CVE-2025-6389Links
CVE-2025-6389
โ30Updated 2 months ago
Alternatives and similar repositories for Ashwesker-CVE-2025-6389
Users that are interested in Ashwesker-CVE-2025-6389 are comparing it to the libraries listed below
Sorting:
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion ๐ทโ85Updated 11 months ago
- ๐ฎ Python Remote administration tool via telegramโ55Updated 9 months ago
- Here are +200 different rats some with source codeโ144Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.โ48Updated last year
- PDF dropper Red Team Scenairosโ228Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)โ112Updated 4 months ago
- Keklick - C2 Hunting, Reporting and Visualization Toolโ63Updated 6 months ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OSโ59Updated 2 months ago
- ใ๐ก๏ธใAVs/EDRs Evasion toolโ103Updated last year
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.โ86Updated 11 months ago
- BackdoorSim: An Educational into Remote Administration Toolsโ119Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filterโ113Updated 2 years ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OSยดsโ59Updated 2 years ago
- CVE-2023-43261 - Credential Leakage Through Unprotected System Logs and Weak Password Encryptionโ57Updated 2 years ago
- CVE-2024-52940 - A zero-day vulnerability in AnyDesk's "Allow Direct Connections" feature, discovered and registered by Ebrahim Shafiei (โฆโ33Updated last year
- A command and control (C2) serverโ58Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.โ87Updated last year
- ObfuXtreme is an advanced Python obfuscation tool for security research, reverse engineering education, and analysis of how obfuscation iโฆโ193Updated 3 weeks ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.โ28Updated 9 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AVโ129Updated 8 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderโ23Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.โ65Updated last year
- Fetching passwords from the chrome browser databaseโ90Updated 2 years ago
- Polymorphic Command & Controlโ102Updated 10 months ago
- Auto exploitation tool for CVE-2024-24401.โ36Updated last year
- Google Chrome Cookies Stealer. Steals Chrome cookiesโ47Updated 2 years ago
- Keygen for Positive Technologies Network Attack Detectorโ31Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagโฆโ117Updated 2 years ago
- Dark-Shell is a Tool for Generating ReverShell Fileโ116Updated 3 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.โ46Updated 9 months ago