Social Engineering: Simple way to make a fake file for Backdoors
☆24Jun 6, 2023Updated 2 years ago
Alternatives and similar repositories for FakeFileMaker
Users that are interested in FakeFileMaker are comparing it to the libraries listed below
Sorting:
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆44Jun 5, 2023Updated 2 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Jun 5, 2023Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Meterpreter_Payload_Detection.exe tool for detecting Meterpreter in memory like IPS-IDS and Forensics tool☆165Jun 5, 2023Updated 2 years ago
- ☆11Aug 1, 2016Updated 9 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- C# code for Transferring Backdoor Payloads by IPv6 Address (AAAA) records and DNS Traffic also Bypassing Anti-viruses☆31Jun 5, 2023Updated 2 years ago
- Sabonis, a Digital Forensics and Incident Response pivoting tool☆18Mar 3, 2022Updated 3 years ago
- Python 3 script for interacting with Shodan API☆20Nov 4, 2024Updated last year
- Red Team Tool Kit☆16Mar 10, 2019Updated 6 years ago
- A Darktrace CLI written in Python☆16Nov 28, 2019Updated 6 years ago
- Web-based Source Code Vulnerability Scanner☆21Jul 8, 2016Updated 9 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆271Jun 5, 2023Updated 2 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Jun 5, 2023Updated 2 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆30Oct 28, 2025Updated 4 months ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 4 years ago
- File Clonnig☆12Apr 18, 2024Updated last year
- ☆28Jun 12, 2017Updated 8 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- Javascript keylogger in a chrome extension that sends keystrokes to discord☆10Jan 5, 2024Updated 2 years ago
- Fast command crack fb☆12Apr 22, 2022Updated 3 years ago
- Advanced Vulnerability Scanner Tool☆69Jun 12, 2024Updated last year
- Tools Hack Fb terbaru 2020 by MBEWLEGS☆10Dec 28, 2021Updated 4 years ago
- Enumerates users based off RDP Screenshots☆36Oct 25, 2023Updated 2 years ago
- Self-adapting Morse Trainer (receiving)☆32Apr 25, 2021Updated 4 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- ☆10Jun 24, 2022Updated 3 years ago
- Protection from saycheese.☆10Aug 25, 2021Updated 4 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Jul 26, 2022Updated 3 years ago
- Automated 2009 Account Cracker☆12Mar 24, 2022Updated 3 years ago
- Dolphin |MMJR| is a Gamecube/Wii Emulator for Android devices; based on Dolphin MMJ source code which is aimed at pure performance.☆21Aug 29, 2021Updated 4 years ago
- Código fonte da calculadora de IMC☆13Oct 16, 2019Updated 6 years ago
- ☆11Feb 21, 2026Updated last week