Whitecat18 / Javahexor
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
☆45Updated last month
Alternatives and similar repositories for Javahexor:
Users that are interested in Javahexor are comparing it to the libraries listed below
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆35Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆30Updated 8 months ago
- Commands and Scripts to attack Linux and Servers☆26Updated 7 months ago
- ☆23Updated 5 months ago
- A C2 framework built for my bachelors thesis☆55Updated 5 months ago
- Persistent Powershell backdoor tool {😈}☆116Updated 8 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆63Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆69Updated last month
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆95Updated last year
- PDF dropper Red Team Scenairos☆204Updated 8 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆183Updated last month
- execute PE in memory Filelessly☆34Updated 2 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆109Updated last year
- Simple Project that Extracts PE Information.☆16Updated 3 weeks ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 8 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆41Updated this week
- ☆34Updated 11 months ago
- ☆60Updated 11 months ago
- A command and control framework.☆50Updated 4 months ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆76Updated 7 months ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆162Updated last year
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆77Updated this week
- UAC Bypass using CMSTP in Rust☆26Updated 4 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆147Updated 10 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆41Updated last month
- Our Tips&Tricks☆115Updated 2 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 10 months ago
- Linux post exploitation tool for info gathering and exfiltration 🐧📡💀☆70Updated 2 months ago
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆245Updated last year