PrettyBoyCosmo / PrettyBoyCosmo
☆17Updated 3 weeks ago
Alternatives and similar repositories for PrettyBoyCosmo
Users that are interested in PrettyBoyCosmo are comparing it to the libraries listed below
Sorting:
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆88Updated last year
- Collection of extra pentest tools for Kali Linux☆103Updated last year
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- Automate installation of extra pentest tools on Kali Linux☆54Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- ☆122Updated last year
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆57Updated this week
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆110Updated last year
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆11Updated last week
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 9 months ago
- Learn how to set up a fake authentication web page on a fake WiFi network.☆109Updated 2 years ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Updated 3 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- ☆20Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆42Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆44Updated 9 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆46Updated 4 years ago
- 🤖 The Modern Port Scanner 🤖☆18Updated 3 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Updated 2 years ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- A Powerful Intruder written in Python☆14Updated 3 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆20Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 6 months ago
- SuperVision is an open source "Google Maps" for hackers developed by CosmodiumCS. SuperVision's map centralizes public data and maps it. …☆46Updated last year
- Testing POC for use cases☆14Updated 5 months ago
- ☆25Updated last month