Use Invoke-PSImage to deliver a payload in an Image
☆53Jan 4, 2018Updated 8 years ago
Alternatives and similar repositories for PSImage-Delivery
Users that are interested in PSImage-Delivery are comparing it to the libraries listed below
Sorting:
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 7 years ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 3 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- A bot that escrows crypto transactions on Reddit☆13Oct 16, 2024Updated last year
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- ☆12Mar 27, 2024Updated last year
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 8 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3☆12Dec 17, 2021Updated 4 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Identify connection of sessions for social engineering attacks.☆58Nov 15, 2016Updated 9 years ago
- Automatically find and embed song lyrics.☆17Dec 14, 2024Updated last year
- SSH into your Weaved or Remot3.it connected Raspberry Pi with one command☆15Aug 26, 2018Updated 7 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Install beef-xss from github☆18Jul 10, 2017Updated 8 years ago
- Java Cheat Sheet : Comprehensive Java Programming Guide With Mini Projects | Best for people, who are coming from other programming langu…☆18Apr 19, 2020Updated 5 years ago
- Camera Hack bot - Powered by XPH4N70M☆23May 26, 2023Updated 2 years ago
- ☆12Jul 17, 2017Updated 8 years ago
- gui tool to create normal payload by msfvenom☆34Dec 26, 2018Updated 7 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- ☆18Jan 31, 2025Updated last year
- A simple and sufficient ERC721 implementation☆21Jul 11, 2022Updated 3 years ago
- WPA/WPA2 SECURITY HACK WITHOUT BRUTE FORCE☆16Mar 7, 2017Updated 8 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- ☆19Apr 29, 2015Updated 10 years ago
- personal fork of OSINT tool recon-ng☆16Dec 17, 2017Updated 8 years ago
- All your layer are belong to us☆21Jan 29, 2014Updated 12 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago