ShadowEye / envisioncollision
Getting Envisioncollision to actually work.
☆12Updated 7 years ago
Alternatives and similar repositories for envisioncollision:
Users that are interested in envisioncollision are comparing it to the libraries listed below
- shadowbroker SMB exploit scanner. Scans for ETERNALSYNERGY ETERNALBLUE ETERNALROMANCE ETHERNALCHAMPION☆36Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Gmail Knocker☆21Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- Utilize Pastebin's scraping API to find interesting pastes.☆16Updated 5 years ago
- Metasploit things, modules, plugins, exploits☆24Updated 10 years ago
- Eternalblue & DoublePulsar scanner☆19Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- Dependencies for Veil 3☆18Updated 8 years ago
- Scanning, offensive tool against vulnerable servers. Technologies: Python, Metasploit API, MongoDB.☆21Updated 8 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- Exploit for Mass Remote Code Execution on GPON home routers (CVE-2018-10562) obtained from Shodan.☆22Updated 6 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆27Updated 8 years ago
- HTTP BOTNET☆8Updated last year
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Wardriving ekoparty☆14Updated 7 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 7 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Updated 7 years ago
- Creating a reverse shell that works on multiple POSIX platforms☆8Updated 9 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆13Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- flood area with fake essids☆20Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆11Updated 7 years ago
- Automatically get internetz from access points that have MAC based filtering enabled☆55Updated 6 years ago