CyberForgeEx-Labs / BlackHatOpsLinks
C programs for sockets, reverse shell, shellcode execution, and process injection.
☆24Updated last week
Alternatives and similar repositories for BlackHatOps
Users that are interested in BlackHatOps are comparing it to the libraries listed below
Sorting:
- Camera phishing screen (to take photos from the front and rear cameras)☆45Updated last month
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆76Updated 3 weeks ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 7 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆224Updated 2 weeks ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆33Updated 10 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 8 months ago
- Some useful books related to Cybersecurity, Linux and more.☆64Updated 5 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆142Updated 11 months ago
- ☆64Updated 6 months ago
- BurnWP Advanced Exploiter System instead Scanner & Custom Plugin for Pentester☆82Updated 2 months ago
- Laravel RCE Exploitation Toolkit☆48Updated last month
- ☆318Updated this week
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆352Updated last week
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 6 months ago
- Physical penetration testing is a critical aspect of security assessment that involves simulating real-world attacks to evaluate the effe…☆84Updated 2 weeks ago
- 免杀木马样本☆97Updated 2 months ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆66Updated 4 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 3 months ago
- Embed a payload inside a PNG file☆363Updated last year
- ☆161Updated last week
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup XSS Forum☆38Updated 4 months ago
- ☆65Updated last year
- BlackMail is a tool for creating and sending spoof mail.☆39Updated 2 years ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆89Updated last month
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆155Updated 3 weeks ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 8 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆462Updated 4 months ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 4 months ago
- Creating a Fake WhatsApp Message via SQLite: Understanding the Logic Behind the Manipulation☆35Updated 4 months ago