MatrixTM / FTPDumper
β‘ Scan World FTP Servers and Steal Their Data π
β38Updated 2 months ago
Alternatives and similar repositories for FTPDumper:
Users that are interested in FTPDumper are comparing it to the libraries listed below
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β104Updated last year
- Boost website hits by generating requests from multiple proxy IPs.β64Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipeβ¦β40Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.β63Updated 3 years ago
- i will upload all the books that helped me in learning in this repoβ20Updated 2 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)β32Updated 2 years ago
- A simple script to obfuscate batch(bat) code easilyβ23Updated last year
- Simple Powershell Http shell With WEB UIβ70Updated 3 weeks ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualβ¦β60Updated 3 years ago
- A python tool(automation) for automatically finding SSH servers on the network and adding them to the botnet for mass administration and β¦β39Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)β39Updated 7 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotalβ78Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, aβ¦β24Updated 2 years ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the bestβ¦β72Updated last year
- Free advanced and modern Windows botnet with a nice and secure PHP panel developed using VB.NET.β38Updated 4 years ago
- Create a malicious pip package (PoC)β11Updated last year
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.β90Updated 2 years ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilitiesβ¦β32Updated this week
- POC Pdf-exploit builder on C#β133Updated last year
- Generate Undetectable Metasploit Payload in a simple wayβ38Updated last year
- Generate FUD Droppers that are undetectable by popular AV'sβ31Updated last year
- Perform With Massive Wordpress Enumerationβ11Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux πΎβ69Updated 2 years ago
- β132Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ22Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.β47Updated last year
- BackdoorSim: An Educational into Remote Administration Toolsβ103Updated last year
- CVE-2023-32243 - Essential Addons for Elementor 5.4.0-5.7.1 - Unauthenticated Privilege Escalationβ81Updated last year
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )β23Updated last year