MatrixTM / FTPDumperLinks
โก Scan World FTP Servers and Steal Their Data ๐
โ40Updated 4 months ago
Alternatives and similar repositories for FTPDumper
Users that are interested in FTPDumper are comparing it to the libraries listed below
Sorting:
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagโฆโ122Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)โ105Updated last year
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipeโฆโ40Updated 3 years ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the bestโฆโ73Updated last month
- Simple Powershell Http shell With WEB UIโ71Updated 2 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.โ110Updated 2 years ago
- Boost website hits by generating requests from multiple proxy IPs.โ67Updated last year
- OpenSSH 9.1 vulnerability mass scan and exploitโ8Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotalโ78Updated last year
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)โ40Updated 8 months ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderโ22Updated 2 years ago
- BackdoorSim: An Educational into Remote Administration Toolsโ103Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data andโฆโ38Updated last year
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)โ32Updated 2 years ago
- ProxyChecker Made in NodeJSโ37Updated 3 years ago
- Perform With Massive Wordpress Enumerationโ11Updated last year
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux ๐พโ69Updated 2 years ago
- Gmail/GSuite account enumeration toolโ51Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actualโฆโ61Updated 4 years ago
- A simple script to obfuscate batch(bat) code easilyโ24Updated last year
- Social Engineering Browser Update Attack.โ56Updated last year
- Mass bruteforce authentication of common services with common credentials.โ48Updated last year
- Generate Undetectable Metasploit Payload in a simple wayโ37Updated last year
- exploit for cve-2023-47246 SysAid RCE (shell upload)โ52Updated last year
- ๐ฎ Python Remote administration tool via telegramโ49Updated last month
- PHP CGI Argument Injection (CVE-2024-4577) RCEโ20Updated 9 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.โ63Updated 3 years ago
- OpenSSH 9.1 vulnerability mass scan and exploitโ105Updated 2 years ago
- The second version of SQL Hunter. SQLi Hunter is a URL (Blind) SQL injection checker for multiple pages.โ90Updated 2 years ago
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.โ48Updated last year