Kracken256 / Malware-Framer
A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.
☆13Updated last year
Alternatives and similar repositories for Malware-Framer:
Users that are interested in Malware-Framer are comparing it to the libraries listed below
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 5 months ago
- Another vulnerability scanner☆17Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- A Simple Script For SSH BruteForce☆36Updated last year
- Automated Linux service that collects information on local Wi-Fi networks and performs deauthentication attacks.☆63Updated last year
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆17Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆19Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated 2 weeks ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated last week
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 6 months ago
- Mass Exploit for CVE 2022-29464 on Carbon☆18Updated 2 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆30Updated last week
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Steal telegram session Bypass 2fa☆16Updated 2 years ago
- ☆13Updated last year
- hacking tools☆14Updated 2 years ago
- Strumenti per Domini - Whois - IP - Data Breach - Email☆14Updated 3 months ago
- MStore API <= 3.9.2 - Authentication Bypass☆7Updated last year
- Pentesting Tools to Automatize Active Directory Hacking☆16Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year