DamonMohammadbagher / FakeFileMakerLinks
Social Engineering: Simple way to make a fake file for Backdoors
☆24Updated 2 years ago
Alternatives and similar repositories for FakeFileMaker
Users that are interested in FakeFileMaker are comparing it to the libraries listed below
Sorting:
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated 2 years ago
- C# code for Transferring Backdoor Payloads by ARP Traffic and Bypassing Anti-viruses (Slow)☆45Updated 2 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆58Updated 2 years ago
- Simple C# reverse shell with shellcode and process injection☆39Updated 9 years ago
- ☆47Updated 9 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- ☆51Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 11 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Updated 8 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic (A - PTR Records) and Bypassing Anti-viruses☆45Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Updated 2 years ago
- Powershell to CodeExecution and ProcessInjection☆64Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Random stuff☆16Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 3 years ago
- Miscellaneous projects related to attacking Windows.☆27Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 10 years ago
- Advanced Netstat Using Python For Windows☆46Updated 8 years ago
- This is a pack of Cortana scripts commonly used on our pentests.☆69Updated 10 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- Listing subdomains about a main domain☆59Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Updated 9 years ago