Remote shell victim machines
☆23Sep 13, 2019Updated 6 years ago
Alternatives and similar repositories for black-witch-botnet
Users that are interested in black-witch-botnet are comparing it to the libraries listed below
Sorting:
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- OpenArk is a open source anti-rookit(Ark) tool on Windows.☆18Jul 18, 2019Updated 6 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆23Mar 3, 2019Updated 7 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- ☆21Oct 3, 2019Updated 6 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆26Aug 16, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- A simple Botnet. 一个简单的僵尸网络Bot。☆21Dec 30, 2020Updated 5 years ago
- python scripts for penetration testing☆11Oct 17, 2019Updated 6 years ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- A script I made to automate basic buffer overflow exploitation as much as possible☆35Oct 17, 2019Updated 6 years ago
- 📝 Instagram Info Scraper☆14Mar 3, 2021Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Original PoC for CVE-2023-30367☆16Jan 4, 2024Updated 2 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated last month
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- mozi僵尸网络的模仿实现 a simulating implementation of mozi botNet virus☆15Jul 31, 2022Updated 3 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- PoC files for the publication 'How Android's UI Security is Undermined by Accessibility'.☆18May 19, 2020Updated 5 years ago
- A general Javascript keylogger to be used in an XSS PoC☆19Feb 23, 2020Updated 6 years ago
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Sep 19, 2019Updated 6 years ago
- CVE 2019-5791 working exploit☆21Sep 9, 2019Updated 6 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Cross-Site Scripting (XSS) vulnerability analyzer☆21Feb 13, 2026Updated 3 weeks ago
- An unauthenticated PoC for CVE-2020-0796☆22Mar 15, 2020Updated 5 years ago
- Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)☆19Jun 19, 2020Updated 5 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago