TriDEntApollO / FishShellLinks
FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (other machines running the multi-handler) after which the server admin/attacker can join sessions and also get a non-interactive reverse shell.
☆8Updated last year
Alternatives and similar repositories for FishShell
Users that are interested in FishShell are comparing it to the libraries listed below
Sorting:
- Social Engineering Browser Update Attack.☆56Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- PassBreaker☆61Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 5 months ago
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Offensive Powershell obfuscator☆27Updated 9 months ago
- Kali Packerge Manager☆65Updated last year
- web based c2 🏴☠️☆13Updated 9 months ago
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated 11 months ago
- BreachCheck is a tool designed to help users search for their passwords in known data breaches and leaks.☆23Updated 10 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆36Updated last year
- This is a exploit with the capability to control ip camera movement even without a username and password.☆58Updated last month
- Hacking with PasteJacking technique☆22Updated 11 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated last month
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆105Updated last year
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- Clipboard poisoning attack.☆58Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆42Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆40Updated 8 months ago
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆35Updated this week
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆12Updated 10 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- Simple-XSS is a multiplatform cross-site scripting (XSS) vulnerability exploitation tool.☆48Updated last year