CyberForgeEx-Labs / BlackHatOpsLinks
C programs for sockets, reverse shell, shellcode execution, and process injection.
☆25Updated last month
Alternatives and similar repositories for BlackHatOps
Users that are interested in BlackHatOps are comparing it to the libraries listed below
Sorting:
- Camera phishing screen (to take photos from the front and rear cameras)☆51Updated last month
- Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulati…☆76Updated 2 weeks ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆35Updated 11 months ago
- ☆63Updated 7 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 8 months ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆187Updated 3 weeks ago
- Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and book…☆489Updated last week
- ☆332Updated last week
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆144Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- A tool that helps you find the real IP addresses hiding behind Cloudflare by checking subdomains.☆276Updated last month
- BlackMail is a tool for creating and sending spoof mail.☆39Updated 2 years ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆298Updated last month
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆80Updated 4 months ago
- EVA is an AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, conte…☆265Updated last week
- Embed a payload inside a PNG file☆364Updated last year
- Metasploit-AI is a cutting-edge cybersecurity framework that combines the power of Metasploit with advanced artificial intelligence and m…☆25Updated 5 months ago
- Laravel RCE Exploitation Toolkit☆49Updated 2 months ago
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 7 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- ☆137Updated 7 months ago
- ☆166Updated 3 weeks ago
- 免杀木马样本☆100Updated 3 months ago
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆110Updated last month
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆67Updated 5 months ago
- Phone: A Mobile Phone Forensic Framework ( Android )☆207Updated 9 months ago
- automated Open Source Intelligence gathering☆180Updated last month
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆493Updated 4 months ago
- Analyze Android native `.so` files☆119Updated 5 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year