byt3bl33d3r / pyobfuscateLinks
A pyobfuscate fork made specifically to randomize and obfuscate python based payloads
☆14Updated 10 years ago
Alternatives and similar repositories for pyobfuscate
Users that are interested in pyobfuscate are comparing it to the libraries listed below
Sorting:
- Converts a command to a base64 powershell compatible string☆27Updated 11 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆40Updated 7 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 7 years ago
- Optional plugins for MITMf☆16Updated 10 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Miscellaneous for various things☆21Updated 11 months ago
- Generates anti-sandbox analysis HTA files without payloads☆16Updated 8 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- ☆24Updated 9 years ago
- Oracle Attacks Tool☆13Updated 9 years ago
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- Automated Brute-Force Login Attacks Against EAP Networks.☆58Updated 5 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Updated 11 years ago
- ☆19Updated 8 years ago
- AV Bypass☆29Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆14Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- Powershell Persistence Locator☆66Updated 9 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 11 years ago
- InfoPath Phishing Repo Resource☆69Updated 7 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago