$2100 .Exe to .Doc Exploit (Python)
☆52Dec 19, 2020Updated 5 years ago
Alternatives and similar repositories for .Exe-to-.Doc-Exploit
Users that are interested in .Exe-to-.Doc-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Word Macro Virus that has a Powershell based Download & Execute Payload☆22Jan 23, 2017Updated 9 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆15Sep 13, 2017Updated 8 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- CryptoJoker is an open source ransomware written in C# created for education purposes only.☆22Jul 8, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- VBA Obfuscator which I used for obfuscating vba codes to embed into Microsoft Word document while I'm doing some signature bypass testing…☆32Feb 26, 2020Updated 6 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- DarkRat source - beware untested source and resources.☆21Dec 7, 2019Updated 6 years ago
- Virus RAT v8.0 Beta☆28Mar 4, 2017Updated 9 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago
- JERK: Java Embedding Rust Kit☆17May 17, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Notes about reverse engineering the Petya2017 ransomware☆20Jul 6, 2017Updated 8 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Display file contents in hexadecimal and ASCII.☆15Oct 5, 2019Updated 6 years ago
- BlackWorm SRC Extract☆16Dec 24, 2016Updated 9 years ago
- Фреймворк криптора/протектора с антиэмуляцией☆32Jun 15, 2019Updated 6 years ago
- CyxvcProtect packer written with C++☆22Nov 13, 2017Updated 8 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- Ransomware written in vb.net for eduational purpouses☆13Aug 19, 2016Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆30May 20, 2021Updated 4 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Dec 2, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This is an implementation of the CVE-2020-0796 aka SMBGhost vulnerability, compatible with the Metasploit Framework☆20Jun 19, 2020Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- Batch NetWork Worm with Download & Execute Payload☆11May 26, 2020Updated 5 years ago
- ClipBanker Spy Trojan☆11Sep 10, 2024Updated last year
- Code Injector Using Code Caves☆15Jul 12, 2015Updated 10 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 9 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- ☆52Dec 11, 2019Updated 6 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Malware Analysis, Anti-Analysis, and Anti-Anti-Analysis☆45Sep 16, 2017Updated 8 years ago
- Weaponizing CLRvoyance for Post-Ex .NET Execution☆38Jul 15, 2021Updated 4 years ago
- A cross-platform remote administration tool written in Java☆19Aug 26, 2020Updated 5 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago