UndeadSec / Enigma
Multiplatform payload dropper
☆259Updated 3 years ago
Alternatives and similar repositories for Enigma:
Users that are interested in Enigma are comparing it to the libraries listed below
- Inject malicious code into *.debs☆267Updated 2 years ago
- A Phishing Dropper designed to Pentest.☆270Updated 7 years ago
- Terminator metasploit payload generator☆177Updated 6 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆337Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago
- Git all your favorite tools in one click☆261Updated 2 years ago
- Browser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Scrip…☆158Updated 8 months ago
- Quasar : An Information Gathering Framework For Lazy Penetration Testers☆154Updated 3 years ago
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆203Updated 6 years ago
- An automated Wireless RogueAP MITM attack framework.☆180Updated 5 years ago
- Hacking systems with the automation of PasteJacking attacks.☆391Updated 3 months ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆288Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- Linux bash script automation for metasploit☆258Updated 5 years ago
- ☆180Updated last year
- A simple script to generate a hidden url for social engineering.☆123Updated 4 years ago
- Hakku Framework penetration testing☆324Updated 3 years ago
- Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener☆251Updated 6 years ago
- Shodanwave is a tool for exploring and obtaining information from Netwave IP Camera.☆250Updated 4 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆77Updated 8 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆281Updated 4 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆435Updated 7 years ago
- Tools for information gathering☆336Updated 7 months ago
- Bluetooth Honeypot☆247Updated 4 years ago
- Python Remote Access Trojan☆137Updated 4 years ago