apacketofsweets / ApolloLinks
A simple, lightweight Remote Access Tool written in Python
☆17Updated 6 years ago
Alternatives and similar repositories for Apollo
Users that are interested in Apollo are comparing it to the libraries listed below
Sorting:
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆27Updated 6 years ago
- AES Ransomware in batch☆11Updated last year
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆18Updated 5 years ago
- Static Binary Deployer. Download and deploy *Nix utilities on a compromised system.☆28Updated 5 years ago
- bash script to prepare Debian machines for OSINT use☆12Updated 5 years ago
- A privilege escalation exploit in the Steam Client☆13Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Pentest ToolKit☆28Updated 5 years ago
- SkyRAT - Powershell Remote Administration Tool☆34Updated 7 years ago
- Ubuntu stealer, steal ubuntu information in local pc☆21Updated 5 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Scripts used for phishing campaigns☆14Updated 11 years ago
- An advanced reverse shell written in Python3.☆22Updated 5 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Updated 2 years ago
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆24Updated 6 years ago
- A framework for secure and scalable network traffic analysis - https://netcap.io☆17Updated 6 years ago
- Shellcode / Buffer Overflow 💣☆20Updated 5 years ago
- SIP hacking tools and scripts☆23Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Updated 11 years ago
- DPE - Default Password Enumeration☆36Updated 12 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆30Updated 7 years ago
- pentest toolbox☆28Updated 3 years ago
- Security program for recovering passwords and pen-testing servers, routers and IoT devices using brute-force password attacks.☆54Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Updated last year
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆53Updated 7 years ago
- ☆70Updated 6 years ago
- A collection of curated Java Deserialization Exploits☆11Updated 7 years ago