Whitecat18 / Javahexor
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
☆31Updated 3 weeks ago
Alternatives and similar repositories for Javahexor:
Users that are interested in Javahexor are comparing it to the libraries listed below
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆30Updated 11 months ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆24Updated 5 months ago
- Commands and Scripts to attack Linux and Servers☆23Updated 4 months ago
- ☆19Updated last month
- TP link AC600 Drivers for All Linux distros☆19Updated 10 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- An List of my own Powershell scripts, commands and Blogs for windows Red Teaming.☆381Updated 2 months ago
- Here are +200 different rats some with source code☆83Updated last year
- This is for Ethical Use only!☆19Updated last week
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆75Updated 4 months ago
- Persistent Powershell backdoor tool {😈}☆111Updated 5 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆93Updated last year
- A powershell module for hiding payloads in the pixels of images☆56Updated 6 months ago
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆106Updated last year
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆40Updated 7 months ago
- Powershell tools used for Red Team / Pentesting.☆74Updated last year
- Embed a payload inside a PNG file☆282Updated 2 months ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆27Updated 2 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆140Updated 7 months ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆23Updated 7 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆61Updated 5 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆232Updated 3 months ago
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆129Updated 8 months ago
- This repo is for the youtube video where we have explained how to make a detectable reverse shell undetectable by windows defender☆26Updated 10 months ago
- C# AV/EDR Killer using less-known driver (BYOVD)☆159Updated last year
- PDF dropper Red Team Scenairos☆179Updated 5 months ago
- Reverse engineered to remove IOCs, added Exchange Online Protection IP blacklist and bing-bot user-agent blocking, DNS configuration and …☆111Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆59Updated 10 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆112Updated this week
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year