ajayrandhawa / Visual-Basic-ScriptsLinks
Visual Basic Scripts Utilities. Fun, Automation, Fundamentals. With the help of these scripts, I develop lots of Exploits which I'm used for automation system tasks. these vb scripts I am also used for system security exploitation.
☆14Updated 7 years ago
Alternatives and similar repositories for Visual-Basic-Scripts
Users that are interested in Visual-Basic-Scripts are comparing it to the libraries listed below
Sorting:
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Contec Smart Home unauthorized user added☆11Updated 7 years ago
- 2020 was a roller coaster of major, world-shaking events. We all couldn't wait for the year to end. But just as 2020 was about to close, …☆18Updated 3 years ago
- SIP hacking tools and scripts☆23Updated 5 years ago
- Chat GPT Things by Taylor Newsome☆12Updated last year
- Assembler tinkering happens here. All your bytes are belong to us.☆13Updated 8 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) Remote Adminstration Tools.☆25Updated 4 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Updated last month
- Subdomain crawler with wordlist using python☆12Updated 5 years ago
- It is primary designed to be hidden and monitoring the computer activity. Take a screenshot of desktop in hidden mode using Visual C++ an…☆60Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 6 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Updated 2 years ago
- NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.☆22Updated 4 years ago
- Scripts used for phishing campaigns☆14Updated 11 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Updated 5 years ago
- Learning-Pentesting-With-Python☆18Updated 7 years ago
- #!/usr/bin/env python import re import hashlib import Queue from random import choice import threading import time import urllib2 import …☆26Updated 11 years ago
- All xxx-arsenal repos in one☆17Updated 6 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆26Updated 6 years ago
- DES Encrypter/Decrypter☆19Updated 8 years ago
- Spider or repeater to find all links.☆10Updated 4 years ago
- Impacket is a collection of Python classes for working with network protocols.☆12Updated 2 years ago
- Reverse shell using socket programming in python☆15Updated 3 years ago
- External tool for WebBreacher/WhatsMyName project. Client supports 'request headers' and POST requests. The script was prepared not only …☆13Updated last year
- L3MON Legacy - Remote Android Management Suite☆34Updated 2 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆14Updated 3 years ago
- Get a number of your tweets from the Twitter API.☆11Updated 3 years ago
- post exploitation: dll injection, process hollowing, RunPe, Keyloggers, UacByPass, PayloadEncryption etc..☆14Updated 8 years ago
- Ivan Ricart Borges - Test for didactic purposes of web pages vulnerables to SQL injection using dbo database user with xp_cmdshell execut…☆21Updated 4 years ago