CYB3RMX / BlackHeart
BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender restrictions. (FOR EDUCATIONAL PURPOSES!!)
☆31Updated 9 months ago
Alternatives and similar repositories for BlackHeart:
Users that are interested in BlackHeart are comparing it to the libraries listed below
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 5 months ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 9 months ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆15Updated 3 years ago
- An automated e-mail OSINT tool☆20Updated 2 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 6 months ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- A tool designed to analyse email headers☆33Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆34Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- It was developed to speed up the processes of SOC Analysts during analysis☆47Updated 10 months ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆23Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆26Updated 7 months ago
- ☆12Updated 2 years ago
- ☆27Updated 2 years ago
- Classic Web shell upload techniques & Web RCE techniques☆26Updated 2 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- ☆24Updated 2 years ago
- "Sucosh" is an automated Source Code vulnerability scanner and assessment framework for Python(Flask-Django) & NodeJs capable of performi…☆32Updated 8 months ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆26Updated 7 months ago
- Quickly discover exposed hosts on the internet using multiple search engine.☆9Updated 2 years ago
- Tools used for Pentesting☆22Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆94Updated 3 months ago
- ⚠️ Malware Development training ⚠️☆30Updated last month
- DNSrecon tool with GUI for Kali Linux☆57Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago