LaCream1 / Malicious-QR-CodeLinks
🚨 Generate and explore malicious QR codes for cybersecurity education and authorized penetration testing to enhance digital security awareness.
☆25Updated last week
Alternatives and similar repositories for Malicious-QR-Code
Users that are interested in Malicious-QR-Code are comparing it to the libraries listed below
Sorting:
- ADKAVEH - One PowerShell script for Active Directory discovery and safe attack simulation.☆37Updated 4 months ago
- Laravel RCE Exploitation Toolkit☆55Updated 3 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Updated last year
- Analyze Android native `.so` files☆119Updated 6 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆55Updated 8 months ago
- Passive leak enumeration tool.☆266Updated this week
- ☆240Updated 10 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆220Updated last month
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆110Updated 7 months ago
- ☆65Updated last year
- ☆29Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆130Updated 10 months ago
- ☆341Updated last week
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆73Updated 6 months ago
- Mythic C2 CheatSheet for OSEP☆54Updated 2 weeks ago
- Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.☆211Updated last month
- Threat-Surface helps with daily tracking of exposed servers, open ports, and infrastructure used by threat actors.☆48Updated 3 weeks ago
- ☆196Updated last week
- A Simple JS code to keylogger data and send it to the personal server☆31Updated last year
- An AI-driven vulnerability scanner that uses Nmap to discover open services on a user-supplied IP, matches each service to relevant CVEs …☆47Updated 8 months ago
- InstantCrack es un motor de recuperación de hashes de alto rendimiento diseñado para realizar búsquedas instantáneas en bases de datos pr…☆24Updated 3 weeks ago
- ☆27Updated last year
- ☆169Updated last month
- A collection of config files for linux focusing on hackthebox theme☆53Updated 4 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆129Updated 8 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆223Updated 9 months ago
- ☆144Updated 8 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆208Updated 4 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆37Updated last year