HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web page. The malicious script decodes and deploys the payload on the targeted device when the victim opens/clicks the HTML attachment/link. The HTML smuggling technique leverages legitimate HTML5 and Ja…
☆150Jun 20, 2022Updated 3 years ago
Alternatives and similar repositories for HtmlSmuggling
Users that are interested in HtmlSmuggling are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆48May 28, 2022Updated 3 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆31Mar 26, 2023Updated 3 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆427Jun 17, 2022Updated 3 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- ✉️ HTML Smuggling generator&obfuscator for your Red Team operations☆189Feb 27, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆19May 23, 2022Updated 3 years ago
- Abusing Remote Windows SMB Shares for Fun and Pen Testing☆15May 23, 2023Updated 2 years ago
- Small project to facilitate creation of .lnk payloads☆82Nov 18, 2022Updated 3 years ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆16Mar 13, 2022Updated 4 years ago
- It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography …☆21May 23, 2022Updated 3 years ago
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆248Mar 19, 2024Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Apr 28, 2023Updated 3 years ago
- shellcode loader for your evasion needs☆353Apr 30, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- HTML smuggling is not an evil, it can be useful☆386Feb 19, 2024Updated 2 years ago
- TrafficWatch, a packet sniffer tool, allows you to monitor and analyze network traffic from PCAP files☆135Jun 1, 2024Updated last year
- ☆11Dec 8, 2023Updated 2 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆258May 25, 2023Updated 2 years ago
- Free Email Providers☆11Aug 15, 2023Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆118Jul 18, 2023Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆284Mar 1, 2021Updated 5 years ago
- Threadless Module Stomping In Rust with some features (In memory of those murdered in the Nova party massacre)☆267Jun 29, 2024Updated last year
- laZzzy is a shellcode loader, developed using different open-source libraries, that demonstrates different execution techniques.☆504Jan 10, 2023Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Simple tool to perform HTML Smuggling.☆67Aug 17, 2021Updated 4 years ago
- Bypass Malware Time Delays☆105Sep 23, 2022Updated 3 years ago
- Patch AMSI and ETW☆252May 8, 2024Updated 2 years ago
- This file implements a library and tool to make malicious PDF files.☆14Jan 10, 2023Updated 3 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- Combining 3 techniques (Threadless Injection + DLL Stomping + Caro-Kann) together to evade MDE.☆78Dec 23, 2023Updated 2 years ago
- 365-Stealer is a phishing simualtion tool written in python3. It can be used to execute Illicit Consent Grant Attack.☆574Mar 6, 2026Updated 2 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Syscall Shellcode Loader (Work in Progress)☆1,270May 8, 2024Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- This script is used to bypass DLL Hooking using a fresh mapped copy of ntdll file, patch the ETW and trigger a shellcode with process hol…☆75Feb 11, 2024Updated 2 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- A PoC implementation for an evasion technique to terminate the current thread and restore it before resuming execution, while implementin…☆536Aug 1, 2022Updated 3 years ago
- Skrull is a malware DRM, that prevents Automatic Sample Submission by AV/EDR and Signature Scanning from Kernel. It generates launchers t…☆460Oct 25, 2021Updated 4 years ago
- Python Packages For Ethical Hacking☆17Apr 20, 2023Updated 3 years ago
- Various methods of executing shellcode☆74Mar 27, 2023Updated 3 years ago