PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
☆53May 27, 2024Updated last year
Alternatives and similar repositories for PyStegosploit
Users that are interested in PyStegosploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Mar 28, 2024Updated last year
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- NCrypt portable crypter is a collection of C++ build tools, a tiny C compiler for the stub, and a useful codebase for anyone wanting to c…☆17Mar 14, 2024Updated 2 years ago
- This Repository Talks about the Follina MSDT from Defender Perspective☆38Jun 2, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆180Apr 25, 2020Updated 5 years ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆36Nov 24, 2024Updated last year
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- A Bumblebee-inspired Crypter☆80Dec 5, 2022Updated 3 years ago
- VMProtect devirtualizer(WIP)☆25Jun 6, 2021Updated 4 years ago
- A container to host website on Tor hidden service with .onion address.☆20Oct 9, 2021Updated 4 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Mar 3, 2019Updated 7 years ago
- HTML smuggling is not an evil, it can be useful☆14Jan 28, 2023Updated 3 years ago
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- Javascript Host inside PowerShell allowing the execution of Javascript, TypeScript from PowerShell. In the future also CoffeeScript, FunS…☆26Apr 17, 2014Updated 11 years ago
- GUI app for Windows to hide Mouse Pointer.☆14Mar 26, 2024Updated 2 years ago
- A automated Meterpreter payload generator script in Bash That can start Listener automatically for specified payload. (only for KALI Linu…☆15Jul 25, 2021Updated 4 years ago
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Try to bruteforce several cypher algorithms that can be used in CTFs☆13Jun 20, 2022Updated 3 years ago
- Kill malawarebytes process. Can be ported to any programming language.☆12Apr 21, 2025Updated 11 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆29Mar 26, 2023Updated 3 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago
- Generate Apache mod_rewrite rules for Mythic C2 profiles☆35Jul 22, 2021Updated 4 years ago
- Telegram cli tool for bot notifications☆17Feb 24, 2021Updated 5 years ago
- A runtime Crypter written in C++ to bypass AVs signature based detection☆40Apr 7, 2023Updated 2 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Convert Any Exe to Bin (Base64 Output or Binary)☆21Jun 19, 2020Updated 5 years ago
- Command line tool to sign ClickOnce manifest with a certificate stored in the Azure Key Vault☆17Aug 15, 2025Updated 7 months ago
- Metasploit auto script menggunakan Anti Trackback, Trap, Ngrok, Stegosploit Untuk membuat backdoor Android☆16Dec 11, 2019Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Small project to facilitate creation of .lnk payloads☆81Nov 18, 2022Updated 3 years ago
- Manual Map Your Files, Bypass 100% Runtime.☆11Aug 31, 2022Updated 3 years ago
- Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]☆65Jan 4, 2023Updated 3 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- ShadeLoader is a shellcode loader designed to bypass most antivirus software. 壳代码, 杀毒软件, 绕过☆45May 22, 2025Updated 10 months ago
- Code samples of .NET shellcode injections, weaponized for use via WebDav and mshta.exe.☆37Jan 23, 2020Updated 6 years ago
- Onion Website Template☆10Oct 24, 2021Updated 4 years ago