Charmve / PyStegosploitLinks
PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282
☆53Updated last year
Alternatives and similar repositories for PyStegosploit
Users that are interested in PyStegosploit are comparing it to the libraries listed below
Sorting:
- Extendable Python script handler for automating penetration testing.☆39Updated 2 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated 2 years ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 3 years ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated last year
- Short Programs For Spreading Malware☆16Updated 4 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- Simple program to steal private files from removable storages☆86Updated this week
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and …☆18Updated 3 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Updated last year
- Customized Password/Passphrase List inputting Target Info☆97Updated last year
- Apache Tomcat Manager API WAR Shell Upload☆35Updated 5 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated 2 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Updated last year
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- A tool for steganography of png files .☆24Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆43Updated 3 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆66Updated 3 years ago