PrettyBoyCosmo / PrettyBoyCosmo
☆17Updated this week
Alternatives and similar repositories for PrettyBoyCosmo:
Users that are interested in PrettyBoyCosmo are comparing it to the libraries listed below
- a collection of payloads and scripts from my "Building an Ethical Hacker EDC" YouTube Series☆24Updated 3 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆88Updated last year
- Social Engineering Browser Update Attack.☆57Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 9 months ago
- Collection of extra pentest tools for Kali Linux☆104Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆42Updated last year
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆102Updated 2 years ago
- ☆18Updated 10 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆98Updated last year
- 🤖 The Modern Port Scanner 🤖☆18Updated 3 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 9 months ago
- ☆20Updated last year
- ☆121Updated last year
- Xfinity / Comcast Wordlist Generator☆61Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆50Updated last week
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆109Updated last year
- Automate installation of extra pentest tools on Kali Linux☆54Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆45Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆39Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆34Updated 9 months ago
- A solution to create obfuscated reverse shells for PowerShell.☆76Updated 2 years ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- Evil Crow Cable Pro device☆105Updated 2 weeks ago
- A reverse TCP payload and listener both written in python3.☆30Updated 10 months ago
- Simple HTTP listener for security testing☆15Updated 2 years ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated last week