Whitecat18 / JavahexorLinks
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
☆56Updated 10 months ago
Alternatives and similar repositories for Javahexor
Users that are interested in Javahexor are comparing it to the libraries listed below
Sorting:
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆45Updated last year
- Here are +200 different rats some with source code☆144Updated 2 years ago
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆36Updated last year
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆129Updated 10 months ago
- A PowerShell-based malware designed to completely disable all Windows security features, featuring UAC bypass and advanced anti-virtualiz…☆63Updated 8 months ago
- PDF dropper Red Team Scenairos☆228Updated last year
- ☆27Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆59Updated 9 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆102Updated 2 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆113Updated 2 years ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆215Updated 3 months ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆79Updated last month
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Embed a payload inside a PNG file☆368Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- Go ransomware leveraging ChaCha20 and ECIES encryption with a web-based control panel.☆46Updated 9 months ago
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆137Updated 9 months ago
- ☆164Updated 2 years ago
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆99Updated 11 months ago
- ☆44Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- What the name says....☆104Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- ☆65Updated last year
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆160Updated 9 months ago
- ☆306Updated last year
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆152Updated last year