CyberForgeEx-Labs / BlackHatOpsLinks
C programs for sockets, reverse shell, shellcode execution, and process injection.
☆25Updated 2 months ago
Alternatives and similar repositories for BlackHatOps
Users that are interested in BlackHatOps are comparing it to the libraries listed below
Sorting:
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆78Updated last month
- ☆345Updated this week
- Camera phishing screen (to take photos from the front and rear cameras)☆56Updated 2 months ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆545Updated last month
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- BlackMail is a tool for creating and sending spoof mail.☆37Updated 2 years ago
- ☆82Updated 8 months ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆303Updated 2 months ago
- ☆170Updated last month
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆326Updated 2 weeks ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆290Updated 2 months ago
- Laravel RCE Exploitation Toolkit☆55Updated 3 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 5 months ago
- Analyze Android native `.so` files☆119Updated 6 months ago
- Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bo…☆505Updated 2 weeks ago
- Passive leak enumeration tool.☆266Updated this week
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Updated 6 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆82Updated 4 months ago
- 免杀木马样本☆102Updated 4 months ago
- ☆65Updated last year
- A comprehensive modern architecture model is proposed to integrate platform solutions and tooling to support a professional Red Team.☆186Updated this week
- Embed a payload inside a PNG file☆368Updated last year
- ☆144Updated 8 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆211Updated last month
- Malicious PixelCode is a security research project that demonstrates a covert technique for encoding executable files into pixel data and…☆152Updated last week
- A powerful collection of tools designed for social engineering research, penetration testing, and security awareness training. These tool…☆57Updated 2 weeks ago