EgeBalci / HERCULES
HERCULES is a special payload generator that can bypass antivirus softwares.
☆603Updated 3 years ago
Alternatives and similar repositories for HERCULES:
Users that are interested in HERCULES are comparing it to the libraries listed below
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- NXcrypt - 'python backdoor' framework☆363Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- EGESPLOIT is a golang library for malware development☆341Updated 8 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆289Updated 7 years ago
- Python / C# Unmanaged PowerShell based RAT☆777Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,404Updated 6 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆498Updated 5 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆331Updated 8 months ago
- ☆512Updated last year
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆544Updated 5 months ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆987Updated 7 years ago
- Malware exploits☆543Updated 5 years ago
- Undetectable Windows Payload Generation☆1,584Updated 2 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 3 years ago
- A Phishing Dropper designed to Pentest.☆271Updated 7 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- Inject malicious code into *.debs☆273Updated 2 years ago
- Second Version of The GoBot Botnet, But more advanced.☆734Updated 3 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆611Updated 6 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆343Updated 7 years ago
- Cloak can backdoor any python script with some tricks.☆489Updated 5 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- Collection of social engineering payloads☆297Updated 7 years ago
- Script to steal passwords from ssh.☆478Updated 6 years ago
- for mass exploiting☆602Updated 2 years ago