Persistent bind shell via pythonic shellcode execution, and registry tampering.
☆22Dec 1, 2017Updated 8 years ago
Alternatives and similar repositories for Shellware
Users that are interested in Shellware are comparing it to the libraries listed below
Sorting:
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- Collection of source code for Polymorphic, Metamorphic, and Permutation Engines used in Malware☆30Oct 28, 2019Updated 6 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26May 12, 2016Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- ☆15Jan 21, 2020Updated 6 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 12 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆27Jan 6, 2020Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- A tool / library for simplifying string obfuscation with xor.☆22Jul 10, 2024Updated last year
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆167Aug 23, 2019Updated 6 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- A rootkit implemented as a linux kernel module☆18May 2, 2015Updated 10 years ago
- Basic multi platform meterpreter loader module.☆16Jul 21, 2020Updated 5 years ago
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- An automated collection and analysis of malware from my honeypots.☆25Feb 8, 2018Updated 8 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Nov 15, 2019Updated 6 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Python network tool, similar to Netcat with custom features.☆197May 31, 2017Updated 8 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- A ctypes powered python keylogger.☆107Nov 12, 2019Updated 6 years ago
- A Crawler That Crawls Email Addresses From Various Sources! Ex: pastebin, github, paste ubuntu e.t.c☆11Sep 10, 2018Updated 7 years ago
- My personal tech blog☆16Dec 13, 2024Updated last year
- Malware management program and tools☆28Dec 16, 2015Updated 10 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago