Charmve / PyStegosploit
PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
☆43Updated 3 months ago
Related projects: ⓘ
- A reverse TCP payload and listener both written in python3.☆32Updated 3 months ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆41Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆19Updated this week
- Enumeration & fingerprint tool☆23Updated 6 months ago
- Generate Undetectable Metasploit Payload in a simple way☆34Updated 9 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆104Updated 2 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆34Updated last year
- Pentesting Tools to Automatize Active Directory Hacking☆12Updated 2 years ago
- the assembly shell and backdoor Trojan☆17Updated 2 years ago
- A Hacking and Pentesting Tool for Windows☆18Updated 5 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- A new and improved DeadTrap with more efficient time span for scanning a number☆28Updated 3 years ago
- This is power full BotNet☆55Updated last year
- Bifrost C2. Open-source post-exploitation using Discord API☆46Updated 3 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆36Updated 10 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆38Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- An open-source .NET Ransomware☆22Updated 3 years ago
- ☆19Updated this week
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆52Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated last year
- Extendable Python script handler for automating penetration testing.☆37Updated last year
- Ded Security Framework is a tool aimed at security professionals☆32Updated 4 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Bypassing File Upload Restriction using Magic Bytes☆12Updated 2 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 2 years ago
- Apache Tomcat Manager API WAR Shell Upload☆29Updated 4 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆34Updated 9 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆49Updated 3 years ago