bdunlap9 / .Exe-to-.Doc-ExploitView external linksLinks
$2100 .Exe to .Doc Exploit (Python)
☆52Dec 19, 2020Updated 5 years ago
Alternatives and similar repositories for .Exe-to-.Doc-Exploit
Users that are interested in .Exe-to-.Doc-Exploit are comparing it to the libraries listed below
Sorting:
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆32Feb 26, 2020Updated 5 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- XssBot-Модульный резидентный бот с супер админкой☆11Jan 6, 2023Updated 3 years ago
- One gate to all syscalls!☆23Mar 12, 2022Updated 3 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆31Jun 15, 2019Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- A cross-platform remote administration tool written in Java☆20Aug 26, 2020Updated 5 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- From my YouTube Tutorial "How to create a flooder with python adn twilio☆10Mar 1, 2018Updated 7 years ago
- Display file contents in hexadecimal and ASCII.☆15Oct 5, 2019Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A first look at browser-based Cryptojacking☆16Jun 7, 2018Updated 7 years ago
- Released presentations of my talks + code that used during these talks☆15Sep 5, 2024Updated last year
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- ☆11Feb 12, 2023Updated 3 years ago
- Virus RAT v8.0 Beta☆28Mar 4, 2017Updated 8 years ago
- A Simple AES Command Line Crypter☆40Jan 19, 2023Updated 3 years ago
- ☆52Dec 11, 2019Updated 6 years ago
- FUZZBUNCH - NSA security tools☆80Apr 16, 2017Updated 8 years ago
- ☆14Nov 29, 2021Updated 4 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Jun 10, 2022Updated 3 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- This project exploits Microsoft's Skype vulneribility and gets any remote user's IP address.☆10Jan 15, 2015Updated 11 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- ☆15Feb 9, 2022Updated 4 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- D-RAT [VB.NET]+[MySQL]+[PHP]☆15Jun 10, 2020Updated 5 years ago
- LiteHTTP is an HTTP bot that is being programmed in C#, on the .NET 2.0 dependency.☆196Oct 28, 2018Updated 7 years ago
- Polymorph file protector☆43Jun 12, 2019Updated 6 years ago