Kracken256 / Malware-FramerLinks
A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.
☆12Updated 2 years ago
Alternatives and similar repositories for Malware-Framer
Users that are interested in Malware-Framer are comparing it to the libraries listed below
Sorting:
- a ZAPROXY Addon ActiveScan for detecting SQL injection with more better way.☆19Updated 4 months ago
- This tool will help in generating reverse shells easily for all types of OS.☆20Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Personnel scripts,projects notes,hacks,random thoughts,mindmap etc....☆32Updated 3 months ago
- ☆25Updated 2 years ago
- xdebug 2.5.5 RCE exploit☆31Updated 4 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 9 months ago
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- hacking tools☆14Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated 2 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- PHP lab to test captcha bypassing☆31Updated last year
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 3 years ago
- ☆14Updated 2 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- my mini collection of exploits and scripts for pentest☆12Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Another vulnerability scanner☆19Updated 2 months ago
- A Simple Script For SSH BruteForce☆36Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆20Updated 8 months ago
- Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: …☆9Updated last year