R47DEV / WH-Encryptor
WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace
☆27Updated 4 years ago
Alternatives and similar repositories for WH-Encryptor:
Users that are interested in WH-Encryptor are comparing it to the libraries listed below
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆40Updated 4 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- Simple RAT in C#☆25Updated 4 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 4 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- Reverse shell using Windows Registry files (.reg)☆19Updated 4 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆13Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- remote administrator framework☆21Updated 7 months ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Fateh-Framework is a simple C2 (Command & Control) tool that attacking windows/Linux machines.☆14Updated 9 months ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- A hacking panel based in Kali tools and more! Only with educational porpuses. The author is not responsable for any damage☆12Updated 3 years ago
- gui tool to create normal payload by msfvenom☆32Updated 6 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- Mini Wordress Exploiter using CVE2020☆31Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆28Updated 10 months ago
- Repository of tools used in my blog☆51Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- A fully undetectable payload generator in python. working in 2021.☆16Updated last year
- The project aims at building a Scan-Time Crypter that can assist a malware in bypassing antivirus software. The Crypter will open the mal…☆14Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago