K3rnel-Dev / AV-KILLER
☆13Updated this week
Related projects: ⓘ
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆19Updated last year
- Mass Exploit - CVE-2023-38388 < Unauthenticated < Arbitrary File Upload☆20Updated last year
- ☆14Updated this week
- CHAOS RAT web panel path RCE PoC☆27Updated 5 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆99Updated last year
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆41Updated last year
- Bypass Windows Defender with C++ .DLL Payload File - Meterpreter Reverse Shell☆29Updated last year
- Simple Powershell Http shell With WEB UI☆65Updated 3 months ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆9Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆49Updated last year
- LNK-Dropper Builder.☆11Updated 2 months ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Updated last year
- An aggressor script that can help automate payload building in Cobalt Strike☆107Updated 7 months ago
- Apache HugeGraph Server Unauthenticated RCE - CVE-2024-27348 Proof of concept Exploit☆15Updated 3 months ago
- exploit for cve-2023-47246 SysAid RCE (shell upload)☆51Updated 9 months ago
- ☆49Updated this week
- Hadoken: A versatile Active Directory pentesting tool engineered to identify vulnerabilities and streamline security assessments.☆46Updated 11 months ago
- Encoder PHP webshell to bypass WAF using XOR operations.☆52Updated last year
- Auto exploitation tool for CVE-2024-24401.☆24Updated last week
- An Exploitation tool to exploit the confluence server that are vulnerable to CVE-2023-22518 Improper Authorization☆44Updated 10 months ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated last month
- A Cobalt Strike Beacon Notifier Via Telegram Bot.☆17Updated 9 months ago
- ProxyChecker Made in NodeJS☆36Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆24Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆12Updated 3 months ago
- CVE-2023-38831-WINRAR-EXPLOIT GENERATOR☆14Updated 6 months ago
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing R…☆57Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆97Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exe☆51Updated 7 months ago