Whitecat18 / JavahexorLinks
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
☆58Updated 8 months ago
Alternatives and similar repositories for Javahexor
Users that are interested in Javahexor are comparing it to the libraries listed below
Sorting:
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆46Updated last year
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆37Updated last year
- Persistent Powershell backdoor tool {😈}☆122Updated last year
- ☆26Updated last year
- Here are +200 different rats some with source code☆126Updated 2 years ago
- PDF dropper Red Team Scenairos☆226Updated last year
- 🔑 Open source stealer written in Go, all logs will be sent to Telegram bot.☆128Updated 7 months ago
- Go Based Crypter That Can Bypass Any Kinds Of Antivirus Products, payload crypter supports over 4 programming languages.☆57Updated 7 months ago
- 🦎Triton_RAT is free and easy to use, one of the best remote administration tools written in Python, fully integrated with Telegram🦎☆69Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆87Updated last week
- Keklick - C2 Hunting, Reporting and Visualization Tool☆63Updated 4 months ago
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆109Updated last year
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆92Updated 9 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆126Updated last month
- EDR & Antivirus Bypass to Gain Shell Access☆246Updated last year
- Embed a payload inside a PNG file☆360Updated last year
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆126Updated 6 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆141Updated 3 years ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆309Updated last week
- RDPCredentialStealer it's a malware that steal credentials provided by users in RDP using API Hooking with Detours in C++☆256Updated 2 years ago
- ☆161Updated 2 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- Over 50 of The Most Deceptive Phishing Templates, Pages & Links for GoPhish!☆50Updated last year
- Steal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.☆112Updated 2 years ago
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆82Updated last year
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆33Updated 3 years ago
- Commands and Scripts to attack Linux and Servers☆34Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆128Updated 8 months ago
- ☆87Updated last year