JoelGMSec / Darkbyte
Repository of tools used in my blog
☆50Updated 10 months ago
Alternatives and similar repositories for Darkbyte:
Users that are interested in Darkbyte are comparing it to the libraries listed below
- Automated Penetration Testing☆14Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Updated 4 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆51Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- A Botnet builder built on Elasticsearch and Kibana with the help of C++ and Python3☆22Updated 4 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- pen testing scripts☆11Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- WebHook for Red Team☆24Updated 3 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- ☆51Updated 3 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Nexus of Android banking Trojans☆15Updated last year
- ☆15Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 9 months ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- serve and destroy aka phisherprice lite is a multi functional pen testing script designed on parrot and kali☆9Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆13Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 5 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago