Use Invoke-PSImage to deliver a payload in an Image
☆53Jan 4, 2018Updated 8 years ago
Alternatives and similar repositories for PSImage-Delivery
Users that are interested in PSImage-Delivery are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 8 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- A little Python Script for cracking Windows Passwords with the help of CrackMapExec☆33Oct 11, 2017Updated 8 years ago
- Download files out of open AWS buckets☆38Dec 12, 2018Updated 7 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Python utility to export a user's starred repositories list into a CSV file☆17May 3, 2018Updated 7 years ago
- Automatically "block" people in images (like Black Mirror) using a pretrained neural network.☆23Mar 31, 2018Updated 7 years ago
- Catch IMAP/POP passwords and see incoming and outgoing messages☆16Sep 15, 2013Updated 12 years ago
- Install beef-xss from github☆18Jul 10, 2017Updated 8 years ago
- This is a site I made for easily hosting tools and payload over apache2 on Kali Linux so they are always ready to go. These are a collect…☆17Jun 3, 2022Updated 3 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Wide internet scanner for etherum and other bitcoin mining devices using default SSH credentials☆48Mar 22, 2022Updated 4 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago
- Generate Professional Phishing Emails Fast And Easy☆25Jul 19, 2021Updated 4 years ago
- HTTPS-based Remote Administration Tool (RAT)☆29Sep 9, 2016Updated 9 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- People tracker on the Internet: Learn to track the world, to avoid being traced.☆12Jan 2, 2018Updated 8 years ago
- A PowerShell script that simplifies life and therefore... phishing.☆20Aug 16, 2022Updated 3 years ago
- Python backdoor that uses http post/get requests to communicate☆42Aug 24, 2016Updated 9 years ago
- A simple bash script to scan common networks with ARP requests to steal a found internal IP address, if DHCP does not automatically assig…☆12Sep 4, 2019Updated 6 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- SSH into your Weaved or Remot3.it connected Raspberry Pi with one command☆15Aug 26, 2018Updated 7 years ago
- Search public IP owner through ARIN☆61May 23, 2025Updated 10 months ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆43Mar 2, 2018Updated 8 years ago
- Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Oct 27, 2023Updated 2 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Jul 3, 2017Updated 8 years ago
- ☆20Aug 9, 2020Updated 5 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- Admin for☆16Jun 3, 2018Updated 7 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆294Feb 28, 2018Updated 8 years ago
- some python3 functions to add spreading features to any python backdoor☆55Jan 22, 2017Updated 9 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- A simple tool that generates a bunch of 50 second clips from one video. Easily create youtube shorts and tiktoks from longer videos.☆11Feb 10, 2023Updated 3 years ago
- Slack/Microsoft Teams notification for new Empire/Meterpreter checkins☆25Nov 19, 2024Updated last year
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆53Mar 28, 2018Updated 7 years ago
- Run interactive android exploits in linux.☆149Feb 11, 2025Updated last year