ShadowEye / envisioncollision
Getting Envisioncollision to actually work.
☆13Updated 7 years ago
Alternatives and similar repositories for envisioncollision:
Users that are interested in envisioncollision are comparing it to the libraries listed below
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆37Updated 7 years ago
- Eternalblue & DoublePulsar scanner☆22Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆25Updated 6 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆21Updated 7 years ago
- log file scrubber☆16Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 4 months ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Wardriving ekoparty☆15Updated 7 years ago
- Fileless Ransomware Example☆36Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 7 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆58Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- GreenKit is an userland rootkit hiding its own files and mining bitcoins on compromised computers. Do /NOT/ download or use this rootkit …☆44Updated 7 years ago
- ☆16Updated 8 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Hive solves a critical problem for the malware operators at the CIA.☆67Updated 7 years ago