bitsadmin / fakelogonscreen
Fake Windows logon screen to steal passwords
☆1,325Updated 5 years ago
Alternatives and similar repositories for fakelogonscreen:
Users that are interested in fakelogonscreen are comparing it to the libraries listed below
- A PowerShell script anti-virus evasion tool☆1,116Updated 2 years ago
- Python antivirus evasion tool☆1,408Updated last year
- PowerShell ReverseTCP Shell - Framework☆1,052Updated 2 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,177Updated 2 years ago
- The Shadow Attack Framework☆1,103Updated 2 years ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,491Updated 3 years ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆978Updated last year
- Steal Net-NTLM Hash using Bad-PDF☆1,105Updated 4 years ago
- Crack any Microsoft Windows users password without any privilege (Guest account included)☆1,138Updated last year
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,359Updated 4 years ago
- Antivirus evasion project☆1,097Updated 3 months ago
- Python AV Evasion Tools☆508Updated 2 months ago
- Starkiller is a Frontend for PowerShell Empire.☆1,459Updated 3 weeks ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆491Updated last year
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,392Updated 4 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆839Updated 2 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,241Updated 8 months ago
- Undetectable Windows Payload Generation☆1,591Updated 2 years ago
- AntiVirus Evasion Tool☆1,694Updated last year
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,165Updated last year
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,090Updated 3 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,805Updated last year
- venom - C2 shellcode generator/compiler/handler☆1,850Updated last year
- Open source C2 server created for stealth red team operations☆806Updated 2 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆995Updated 2 years ago
- Mimikatz implementation in pure Python☆2,988Updated last month
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,115Updated 2 years ago
- Python / C# Unmanaged PowerShell based RAT☆780Updated 2 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆1,311Updated 9 months ago
- A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.☆1,908Updated last month