Xanthorox / Js-to-exe-CrypterLinks
an simple python script for converting exe to js , standalone js can be used to convert exe payloade to .js file , Works on All windows version all types of R@t tested
☆15Updated 2 months ago
Alternatives and similar repositories for Js-to-exe-Crypter
Users that are interested in Js-to-exe-Crypter are comparing it to the libraries listed below
Sorting:
- Abusing VirusTotal API to host our C2 traffic, usefull for bypassing blocking firewall rules if VirusTotal is in the target white list , …☆27Updated 2 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated 2 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- Fully Undetected Grabber (Grabs Wallets, Passwords, Cookies, Modifies Discord Client Etc.) Disclaimer: We are not responsible for any dam…☆15Updated this week
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆31Updated last month
- LummaC2 extracted binaries by reversing & LummaC2 Stealer Analysis☆62Updated 4 months ago
- POC | Steal user WhatsApp information/data☆65Updated last month
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆46Updated 11 months ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- payload Execution by Fake Windows SmartScreen with requires Administrator privileges & Turn off real SmartScreen Filter☆106Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Advanced Ransomware Made with Xanthorox AI☆28Updated 2 months ago
- The tool that bypasses the firewall's Application Based Rules and lets you connect to anywhere, ANY IP, ANY PORT and ANY APPLICATION.☆62Updated 10 months ago
- DotRat is a Telegram Rat which includes good features and non privileged persistence. Written in C#☆12Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- FIshShell is a multi-session handler and Windows & Linux backdoor payload generator. It allows users\targets to connect to the server (ot…☆8Updated last year
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 5 months ago
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆76Updated last month
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆23Updated 2 weeks ago
- Simple Tool for webhacking☆11Updated 2 years ago
- Kubernetes, Clusters and Dockers Enumeration in GCP and AWS environments☆13Updated last year
- File Manager☆12Updated last month
- ☆29Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- the assembly shell and backdoor Trojan☆18Updated 3 years ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Trojan written in C++ for Windows☆18Updated last year