ShadowEye / envisioncollisionLinks
Getting Envisioncollision to actually work.
☆14Updated 7 years ago
Alternatives and similar repositories for envisioncollision
Users that are interested in envisioncollision are comparing it to the libraries listed below
Sorting:
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 8 years ago
- Eternalblue & DoublePulsar scanner☆22Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 6 months ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 6 years ago
- Public exploits (re)writed while learning.☆13Updated 11 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆24Updated 7 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- Password cracking utility☆53Updated 4 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Collection of cracked malware☆14Updated 6 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆48Updated last year
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 6 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Updated 12 years ago
- Secure/anonymous IRC-like chat using TOR hidden services☆40Updated 11 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- Automated Cyber Offense☆91Updated 6 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- Experimental examples of Ransomware in different languages☆37Updated 7 years ago