NullArray / ShellwareLinks
Persistent bind shell via pythonic shellcode execution, and registry tampering.
☆23Updated 7 years ago
Alternatives and similar repositories for Shellware
Users that are interested in Shellware are comparing it to the libraries listed below
Sorting:
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- AV Bypass☆29Updated 7 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆57Updated 5 years ago
- The Python Password-Protected Obfuscator☆34Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆19Updated 8 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- DNS Botnet Server and Client☆35Updated 5 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- This repo is all about myself coded exploit codes :)☆55Updated 5 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆23Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago