IP obfuscator made to make a malicious ip a bit cuter
☆549Oct 14, 2024Updated last year
Alternatives and similar repositories for Cuteit
Users that are interested in Cuteit are comparing it to the libraries listed below
Sorting:
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- Random scripts I write to automate non-hacking stuff☆23Mar 24, 2019Updated 6 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Share wifi on windows with arranged password like every hour or every day☆14Feb 4, 2017Updated 9 years ago
- cobalt strike 自启动脚本☆41Mar 19, 2017Updated 8 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,756Dec 9, 2025Updated 2 months ago
- A python3 script that uses cl1p website to send and receive secret messages☆31Oct 1, 2020Updated 5 years ago
- A python script designed to grab the original url from an adfly url without opening it :D☆57Mar 3, 2017Updated 9 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134May 27, 2019Updated 6 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,416Oct 3, 2020Updated 5 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆506Jun 27, 2019Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆366Jun 26, 2017Updated 8 years ago
- Script to steal passwords from ssh.☆489Dec 19, 2018Updated 7 years ago
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆108Aug 6, 2018Updated 7 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- ntlm relay attack to Exchange Web Services☆334Jan 15, 2018Updated 8 years ago
- fireELF - Fileless Linux Malware Framework