A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.
☆16Mar 28, 2023Updated 3 years ago
Alternatives and similar repositories for Malware-Framer
Users that are interested in Malware-Framer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Official Website of Viral Tool malware generator☆15Mar 24, 2020Updated 6 years ago
- Locate device location using Social engineering☆18Sep 30, 2022Updated 3 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- this module will automatically create evil twin and store password that user input☆15Jan 26, 2023Updated 3 years ago
- An account hacking program with some built-in action keywords.☆14Apr 1, 2021Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A local-first, CLI-driven multi-agent AI software engineering workflow orchestrator with feed specs, PRDs, and guidelines to auto-generat…☆37Updated this week
- WebSecurityVision is a tool for checking XSS vulnerabilities and security headers in web applications, displaying browser information if …☆11Apr 6, 2023Updated 3 years ago
- Sends a verify code to your email from microsoft☆13Aug 17, 2025Updated 8 months ago
- This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"☆14Dec 8, 2023Updated 2 years ago
- OWASP WSTG Türkçe Rehber☆14Apr 9, 2025Updated last year
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆18Jan 23, 2025Updated last year
- An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.☆13Jan 5, 2021Updated 5 years ago
- This contains a bundle with an executable to exploit ms17-010 remote or locally. It does not require Python.☆16Jan 10, 2019Updated 7 years ago
- Gathering All Nuclei Fuzzing Templates in a Single Repo.☆11Apr 23, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Command line interface for our public API☆20Jan 9, 2023Updated 3 years ago
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- LulzSec-Toolkit enables the user to have a menu with the most important tools. But this tool not only allows you to have the most importa…☆30Jun 24, 2020Updated 5 years ago
- OSINT tool for Instagram☆15Feb 19, 2019Updated 7 years ago
- hacking framework complete source-code for web, wifi, url, sql-injection and doing a complete web scan for starters.☆30Dec 8, 2022Updated 3 years ago
- HW2022公开的POC整理☆11Jul 31, 2022Updated 3 years ago
- Based on ossiozac/Raspberry-Pi-Zero-Rubber-Ducky-Duckberry-Pi☆12Oct 27, 2020Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- This application contains intentional security vulnerabilities and should never be deployed in production environments or exposed to the …☆16Apr 25, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- This repository demonstrates a PHP-based technique for retrieving someone's IP address by disguising it as an image using MOD re-write. I…☆16May 3, 2024Updated last year
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated 2 months ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- InfoG is an information gathering tool. You can find ip addresses, phone number details and much more.☆37Nov 26, 2020Updated 5 years ago
- SkillDock.io is a registry of reusable AI Skills based on the AgentSkills specification. Discover, install, and publish versioned Skills …☆52Mar 3, 2026Updated last month
- Torify the system with multiple tor exit nodes and load balance.☆18May 29, 2024Updated last year
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Bu Course LLM(Large Language Model) Fine Tune işlemlerini Türkçe klavuz olarak☆11Mar 29, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Nov 8, 2022Updated 3 years ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- Collection of antivirus bypass techniques☆13Nov 20, 2023Updated 2 years ago
- Run the iproyal(pawns) client as a container on the Linux platform (ways to earn extra)☆10Aug 31, 2023Updated 2 years ago
- Telegram base free Rat☆13Apr 26, 2025Updated 11 months ago
- Ping Monster v1.9 - a freeware ping monitoring tool, with some alert actions like: send email, sound alert, http post.☆11Sep 6, 2023Updated 2 years ago
- ☆12Dec 6, 2022Updated 3 years ago