Exploit-install / Dr0p1t-Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
☆11Updated 7 years ago
Alternatives and similar repositories for Dr0p1t-Framework:
Users that are interested in Dr0p1t-Framework are comparing it to the libraries listed below
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Cpanel Brute Force Tool (Perl)☆16Updated 11 years ago
- A web app scanner☆26Updated 11 years ago
- Search bing with python☆12Updated 10 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆28Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 5 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- Phishing Toolkit☆20Updated 7 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Various exploits☆10Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆19Updated 5 years ago
- Port scanning and domain utility.☆30Updated 7 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 9 years ago