Whitecat18 / Javahexor
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
☆33Updated 2 months ago
Alternatives and similar repositories for Javahexor:
Users that are interested in Javahexor are comparing it to the libraries listed below
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆32Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆27Updated 6 months ago
- Commands and Scripts to attack Linux and Servers☆24Updated 5 months ago
- ☆20Updated 2 months ago
- TP link AC600 Drivers for All Linux distros☆21Updated 11 months ago
- Persistent Powershell backdoor tool {😈}☆113Updated 6 months ago
- Here are +200 different rats some with source code☆87Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆42Updated 8 months ago
- A C2 framework built for my bachelors thesis☆55Updated 3 months ago
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆390Updated 3 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆60Updated 6 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆232Updated 4 months ago
- This is for Ethical Use only!☆29Updated 2 weeks ago
- ☆33Updated 9 months ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆51Updated 2 years ago
- A command and control (C2) server☆56Updated 7 months ago
- 🔬Collection of malware, ransomware, RATs, botnets, stealers, etc.☆114Updated 3 years ago
- PDF dropper Red Team Scenairos☆182Updated 6 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆240Updated last year
- ☆153Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆124Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆143Updated 8 months ago
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆56Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆108Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆22Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- ☆34Updated last month
- This comprehensive and central repository is designed for cybersecurity enthusiasts, researchers, and professionals seeking to stay ahead…☆104Updated last month