A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.
☆16Mar 28, 2023Updated 3 years ago
Alternatives and similar repositories for Malware-Framer
Users that are interested in Malware-Framer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official Website of Viral Tool malware generator☆15Mar 24, 2020Updated 6 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- his list can be used by penetration testers when testing for SQL injection authentication bypass.A penetration tester can use it manually…☆19Jun 7, 2018Updated 7 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 7 months ago
- Pimp my Kali but for lazy AFKers☆12Jun 18, 2023Updated 2 years ago
- Repo containing all info, scripts, etc. related to CVE-2021-44228☆10Dec 29, 2021Updated 4 years ago
- Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-2…☆39Jun 21, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- steal cookies from website using xss☆12Mar 25, 2020Updated 6 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- Generate Random Reset Instagram URLs and check if they still valid for a complete account takeover☆12Apr 26, 2022Updated 3 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- scrap email from instagram user followers☆11Jul 21, 2023Updated 2 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆30Jun 24, 2020Updated 5 years ago
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- Cross-Site Scripting (XSS) is one of the most well known web application vulnerabilities. It even has a dedicated chapter in the OWASP To…☆12Jan 30, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- HW2022公开的POC整理☆11Jul 31, 2022Updated 3 years ago
- spring-cloud-gateway-rce CVE-2022-22947☆13Jul 13, 2022Updated 3 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 11 months ago
- ☆14Sep 13, 2019Updated 6 years ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- InfoG is an information gathering tool. You can find ip addresses, phone number details and much more.☆37Nov 26, 2020Updated 5 years ago
- The NodeJs cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.☆13Apr 5, 2023Updated 2 years ago
- Torify the system with multiple tor exit nodes and load balance.☆18May 29, 2024Updated last year
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆14May 10, 2023Updated 2 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago