XORbit01 / ddosarmy
π₯ ddos clustering
β40Updated last year
Related projects: β
- A simple and efficent script to obfuscate python payloads to make it completely FUDβ34Updated 9 months ago
- Generate FUD Droppers that are undetectable by popular AV'sβ32Updated 10 months ago
- GENERATE PYTHON BASED FUD STUBβ16Updated 10 months ago
- Generate Undetectable Metasploit Payload in a simple wayβ34Updated 9 months ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whicβ¦β38Updated 2 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotalβ71Updated 10 months ago
- A simple script to obfuscate batch(bat) code easilyβ23Updated 10 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORKβ14Updated last year
- β49Updated this week
- i will upload all the books that helped me in learning in this repoβ19Updated last year
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, β¦β39Updated last year
- DASH is deep osint Scanner. You just need username to start osint scan.β44Updated last year
- IRC botnet, that's mainly used to launch denial-of-service attacks.β27Updated 8 months ago
- β50Updated this week
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )β17Updated last year
- β37Updated this week
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generatorβ15Updated 2 years ago
- β17Updated last year
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)β31Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data andβ¦β21Updated 5 months ago
- Boost website hits by generating requests from multiple proxy IPs.β49Updated 6 months ago
- A reverse TCP payload and listener both written in python3.β32Updated 3 months ago
- It's go boom, a simple webserver DDoS tool using differents proxy for each threadsβ12Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defenderβ19Updated last year
- XWorm 5.0 RAT . FUD Rat Builder & Open SRCβ43Updated 11 months ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachmβ¦β104Updated 2 years ago
- Social Engineering Browser Update Attack.β55Updated 10 months ago
- A collection of malwares found on the internet.β52Updated last year
- β11Updated this week
- β26Updated this week