bdunlap9 / .Exe-to-.Doc-ExploitLinks
$2100 .Exe to .Doc Exploit (Python)
☆52Updated 4 years ago
Alternatives and similar repositories for .Exe-to-.Doc-Exploit
Users that are interested in .Exe-to-.Doc-Exploit are comparing it to the libraries listed below
Sorting:
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Updated 8 years ago
- Revenge-RAT C# Stub - Fixed☆95Updated 5 years ago
- Escalation / Bypass Windows UAC☆115Updated 6 years ago
- njRAT C# Stub - Fixed For PowerShell☆61Updated 6 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago
- Create a powershell malware loader to run C#.cs code on runtime☆66Updated 6 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆73Updated 4 years ago
- Simple Malware Downloader☆128Updated 6 years ago
- Download a payload and make it run from registry without droppng.☆110Updated 6 years ago
- Crypter made in C#. Nearly FUD. Detection rate 2/38☆52Updated 5 months ago
- JS Jscript - download file from url then run it☆61Updated 5 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Updated 6 years ago
- Simple C# Keylogger (Keyboard Layout)☆66Updated 6 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Updated 6 years ago
- Download and loader .NET payload☆37Updated 6 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 6 years ago
- Download a .NET payload and run it on memory☆71Updated 6 years ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70Updated 6 years ago
- Panel for the HTTP botnet UBoat - https://github.com/UBoat-Botnet/UBoat/☆115Updated 4 years ago
- A super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients written in Rust, Ba…☆144Updated 6 years ago
- Simple example of how to remove all malwares from disk and registry.☆43Updated 6 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 8 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆99Updated 3 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Updated 5 years ago
- Simple way to read wirte delete values from registry☆18Updated 6 years ago
- An open-source, centralized HTTPS botnet☆45Updated 5 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆61Updated 8 years ago
- A FUD Backdoor Reverse Shell coded in CPP for any Windows distribution, that will fire a decoy app in the foreground while connecting bac…☆20Updated 6 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆105Updated 7 years ago