FreeLesio / WiFi-EvasionView external linksLinks
Extract Silently WiFi Passwords By Mail & USB
☆19Dec 4, 2021Updated 4 years ago
Alternatives and similar repositories for WiFi-Evasion
Users that are interested in WiFi-Evasion are comparing it to the libraries listed below
Sorting:
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- ☆12May 12, 2019Updated 6 years ago
- Process injection via KernelCallbackTable☆13Jan 28, 2022Updated 4 years ago
- edge --> powerpoint --> remote-file --> shell☆11May 17, 2019Updated 6 years ago
- Joker Botnet Source LEAKED☆10Jun 5, 2021Updated 4 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆16Aug 6, 2020Updated 5 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Sep 29, 2020Updated 5 years ago
- With this RunPE you can easily inject your payload in any x86 or x64 program.☆15Jun 3, 2019Updated 6 years ago
- Basic disassembly technique to slow down disasm process☆11Sep 20, 2019Updated 6 years ago
- UPDATED 2022 Flame malware sourcecode available !! Forked. I will later provide my sample of Flame, Duqu and Gauss.☆20Mar 4, 2024Updated last year
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- A simple AES malware crypter☆16Mar 16, 2018Updated 7 years ago
- Download a payload and make it run from registry without droppng.☆109Apr 9, 2019Updated 6 years ago
- ☆44Dec 31, 2016Updated 9 years ago
- A simple Nim stager (w/ fiber execution)☆20Jan 31, 2022Updated 4 years ago
- Loader and RunPE file executer☆18Jun 12, 2019Updated 6 years ago
- Accurately Locate Smartphones using Social Engineering☆13Jun 3, 2020Updated 5 years ago
- Haram Tool is Software Web Penetration Testing Tool.☆24Mar 27, 2024Updated last year
- Muteces (mutexes/mutants) used by various malware families☆23Nov 11, 2024Updated last year
- Malware Libraries focused in help Malware Development☆26Mar 20, 2023Updated 2 years ago
- Rootkit loader for your rootkit dll, x86/x64 system wide DLL injection (+appinit_dlls registry create) uses heavens gate☆22Jan 28, 2021Updated 5 years ago
- Debugger checks in 3 ways☆19Jan 25, 2018Updated 8 years ago
- Find kernel32 base and API addresses. Simple C++ implementation☆24Apr 7, 2022Updated 3 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- HTTP/HTTPS based Golang botnet☆19Oct 1, 2021Updated 4 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- An example of PE hollowing injection technique☆25Jun 28, 2019Updated 6 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Tool to unpack .net assemblies packed by BoxedAppPacker☆24Sep 11, 2017Updated 8 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago
- Pulls Binance Smart Chain feed of newly-verified contracts every 30 seconds, then checks their contract code for links to socials.Returns…☆17Feb 22, 2023Updated 2 years ago
- Demonstrate about file-less malware approach using JavaScript☆53Jun 14, 2017Updated 8 years ago