D4Vinci / Cuteit
IP obfuscator made to make a malicious ip a bit cuter
☆545Updated 6 months ago
Alternatives and similar repositories for Cuteit:
Users that are interested in Cuteit are comparing it to the libraries listed below
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆438Updated 7 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- Cloak can backdoor any python script with some tricks.☆492Updated 5 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 8 months ago
- ☆513Updated last year
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆290Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- Script to steal passwords from ssh.☆478Updated 6 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆498Updated 5 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆280Updated last year
- Hacking systems with the automation of PasteJacking attacks.☆397Updated 6 months ago
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆603Updated 3 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- Python / C# Unmanaged PowerShell based RAT☆779Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 5 years ago
- network reconnaissance toolkit☆423Updated 6 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,409Updated 6 years ago
- Tools, scripts and tips useful during Penetration Testing engagements.☆622Updated 2 months ago
- Selenium powered Python script to automate searching for vulnerable web apps.☆344Updated 3 years ago
- metasploitHelper☆247Updated 5 years ago
- Collection of social engineering payloads☆297Updated 7 years ago
- Phishing on Twitter☆252Updated 6 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆340Updated 4 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆237Updated 4 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆344Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆372Updated last year
- A stealthy Python based Windows backdoor that uses Github as a command and control server☆263Updated 7 years ago