Whitecat18 / JavahexorLinks
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
☆57Updated 10 months ago
Alternatives and similar repositories for Javahexor
Users that are interested in Javahexor are comparing it to the libraries listed below
Sorting:
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆44Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆76Updated 3 weeks ago
- PDF dropper Red Team Scenairos☆228Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆36Updated last year
- Here are +200 different rats some with source code☆138Updated 2 years ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆58Updated 8 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆144Updated 3 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆111Updated last year
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 9 months ago
- ☆164Updated 2 years ago
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆58Updated 8 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆493Updated 4 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆98Updated last month
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆34Updated 3 years ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆64Updated 5 months ago
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 8 months ago
- Dark-Shell is a Tool for Generating ReverShell File☆116Updated 2 months ago
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆58Updated last year
- CryptChat: Beyond Secure Messaging 🛡️☆71Updated 2 years ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 10 months ago
- Generate FUD backdoors☆262Updated 2 years ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆134Updated 8 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆142Updated last month
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆154Updated last year
- BrowserSnatch is a powerful browser stealer or browser data extraction tool intended to be used for ethical hacking or penetration testin…☆292Updated last month
- Embed a payload inside a PNG file☆364Updated last year