Whitecat18 / JavahexorLinks
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
☆57Updated 7 months ago
Alternatives and similar repositories for Javahexor
Users that are interested in Javahexor are comparing it to the libraries listed below
Sorting:
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆43Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆30Updated 3 years ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆36Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆122Updated 5 months ago
- PDF dropper Red Team Scenairos☆223Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆107Updated last year
- Here are +200 different rats some with source code☆123Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆78Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆85Updated last month
- ☆162Updated 2 years ago
- ☆65Updated last year
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆236Updated this week
- Dark-Shell is a Tool for Generating ReverShell File☆114Updated 2 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated 2 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 6 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆115Updated last week
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆201Updated 7 months ago
- ☆85Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆110Updated 2 years ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆65Updated last month
- Commands and Scripts to attack Linux and Servers☆33Updated 5 months ago
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated last year
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆191Updated 2 weeks ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆211Updated 6 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆256Updated 2 years ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆153Updated last year