byt3n33dl3 / .crackdown
For radio frequency research ( RF attack ) this script can cause severe damage to an individual's privacy ( trust-attack ) by enabling attackers to intercept, modify, or disrupt communication between wireless devices. Educational purposes only
☆12Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for .crackdown
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.☆13Updated 3 months ago
- Six Degrees of Enterprise Domain Admin☆13Updated last month
- Trojan GUI && display panel☆11Updated 4 months ago
- This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. CARNOTAURUS …☆31Updated 6 months ago
- Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.☆16Updated 4 months ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password c…☆41Updated 3 months ago
- Pegasus, the Spyware that represents a significant threat to Privacy and Security, showcasing the capabilities of modern surveillance tec…☆23Updated 4 months ago
- Rootkit and Kernel attack kit, 𝗜𝘀𝗮𝗯𝗲𝗹𝗹𝗮 program will enables cyber attacks to gain access to and infiltrate data from machines wi…☆10Updated 3 months ago
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security A…☆41Updated 5 months ago
- Remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the ker…☆10Updated 4 months ago
- offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass sev…☆19Updated 4 months ago
- Worm roulette, a Miscellaneous tools for Gambllers. Don't do it guys☆8Updated 4 months ago
- Seven Degrees of Domain Admin☆70Updated 2 weeks ago
- Advance web scanner, It's Designed to identify various Security vulnerabilities in web applications by scanning for misconfigurations, in…☆15Updated 3 months ago
- 🗝 BotNet ( .NET ) Source Codes☆13Updated 6 months ago
- Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of 𝗧𝗲𝗲𝘁𝗵 cybertooth && 𝗝𝗼𝗵…☆60Updated 4 months ago
- Open source Penetration Testing Software for automatic Injection attacks, Exploiting query Injections flaw and Taking over of Database se…☆38Updated 2 weeks ago
- The most advanced GUI frontend && CLI RAT for MacOS and OSX distro, Remote Access Tool. Penetrate the SSL and Security system of Unix wit…☆21Updated last month
- Offensive Remote Access for any smartphones, most advanced on Android. crowdown is software that gives a person full control of another p…☆26Updated 3 months ago
- TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. …☆65Updated 4 months ago
- 𝗡.𝗢.𝗖 is a source code to bypass antivirus, Change some strings in the PoC binary or script to get it pass the AV. This can be a time …☆10Updated 3 months ago
- Apple iD & Credentials BruteForcer. iCloud Apple ID Dictionary Attack that Bypasses Account Lockout restrictions and Secondary Authentica…☆12Updated 2 months ago
- ⛓️💥 Notorious Smartphones Malware, for Remote Administration and Access tools, Which include Remote Device control and advanced Spyware…☆101Updated last month
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆154Updated 3 weeks ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆190Updated 5 months ago
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆265Updated 3 months ago
- ☆125Updated 3 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆86Updated 2 weeks ago
- pysnaffler☆85Updated 2 months ago
- Generate BloodHound compatible JSON from logs written by ldapsearch BOF, pyldapsearch and Brute Ratel's LDAP Sentinel☆134Updated 2 weeks ago