PrettyBoyCosmo / PrettyBoyCosmoLinks
☆17Updated 2 weeks ago
Alternatives and similar repositories for PrettyBoyCosmo
Users that are interested in PrettyBoyCosmo are comparing it to the libraries listed below
Sorting:
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆87Updated last year
- ☆122Updated last year
- Collection of extra pentest tools for Kali Linux☆105Updated 2 years ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆42Updated last year
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆63Updated this week
- Learn how to set up a fake authentication web page on a fake WiFi network.☆109Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆61Updated 4 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆104Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆100Updated last year
- This project is a server-side solution for seamless URL redirection when a QR code is scanned. It redirects users to a specified URL and …☆11Updated 2 weeks ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 10 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆45Updated 10 months ago
- 📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection…☆38Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆49Updated 4 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- 🤖 The Modern Port Scanner 🤖☆19Updated 3 years ago
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆159Updated 2 weeks ago
- Automate installation of extra pentest tools on Kali Linux☆56Updated 4 years ago
- Will disable windows defender at first and then run PowerShell as administrator to run the download code.☆13Updated 3 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 11 months ago
- ☆157Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆69Updated this week
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆113Updated last year
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆54Updated 3 years ago
- The Havoc Framework☆57Updated 2 years ago
- Scripts for offensive security☆125Updated last week