Kracken256 / Malware-FramerView external linksLinks
A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.
☆16Mar 28, 2023Updated 2 years ago
Alternatives and similar repositories for Malware-Framer
Users that are interested in Malware-Framer are comparing it to the libraries listed below
Sorting:
- his list can be used by penetration testers when testing for SQL injection authentication bypass.A penetration tester can use it manually…☆19Jun 7, 2018Updated 7 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 4 years ago
- Sends a verify code to your email from microsoft☆12Aug 17, 2025Updated 5 months ago
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- Programa simple hecho en python que destruye tokens de discord.☆11Feb 25, 2023Updated 2 years ago
- InfoG is an information gathering tool. You can find ip addresses, phone number details and much more.☆37Nov 26, 2020Updated 5 years ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆29Jun 24, 2020Updated 5 years ago
- scrap email from instagram user followers☆11Jul 21, 2023Updated 2 years ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 2 years ago
- Free, Autonomous Self-Orchestrating Local Agent in Javascript.☆11May 10, 2023Updated 2 years ago
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-2…☆39Jun 21, 2023Updated 2 years ago
- Smishing Botnets Going Viral in Iran☆10Feb 19, 2022Updated 3 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 13 years ago
- ☆15Feb 2, 2025Updated last year
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆14Oct 5, 2024Updated last year
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- APCMini streamdeck tool for OBS studio☆10Apr 28, 2022Updated 3 years ago
- Information gathering & OSINT reconnaissance tool for phone numbers☆13Dec 10, 2018Updated 7 years ago
- Kingdom-generator: generates a lineage of citizens, fills their history, lets them find jobs, have friends, enemies as OpenDocument.☆12May 3, 2014Updated 11 years ago
- Unicode encoding attacks with machine learning☆98Nov 25, 2021Updated 4 years ago
- Chat with a PDF using a simple web UI☆10Aug 2, 2023Updated 2 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Remote Administration Tool☆13Jul 9, 2023Updated 2 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- Description and exploit of CVE-2023-33831 affecting FUXA web-based Process Visualization (SCADA/HMI/Dashboard) software.☆10Oct 27, 2024Updated last year
- A simple offline *.srt translator using transformers models that helps you to translate subtitles.简单的离线字幕翻译器,使用transformers模型,助你翻译字幕。☆10Jun 13, 2023Updated 2 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 12 years ago
- Advanced way to mitigate bot attacks for large networks☆11Mar 3, 2019Updated 6 years ago
- Trustzone Exploit that allows running code in secure mode on Surface RT (Tegra 3) with the help of Yahallo (by imbushuo)☆11Mar 30, 2023Updated 2 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 9 months ago
- This repository is to provide a write-up and PoC for CVE-2023-41717.☆12Aug 31, 2023Updated 2 years ago
- C++ keylogger to save all the keys pressed into a local txt file☆11Apr 6, 2023Updated 2 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year