byt3n33dl3 / CrackMacExpoLinks
The most advanced Mach-O binary malware for macOS or Unix-based distro.
☆43Updated 11 months ago
Alternatives and similar repositories for CrackMacExpo
Users that are interested in CrackMacExpo are comparing it to the libraries listed below
Sorting:
- Attacking Assimilation-bridge by looping [SNMPv3 & GPG], usingas CPUs, FPGAs cycles [MOV EAX, 0x989], most advanced password and logon re…☆85Updated 9 months ago
- Backdoor for Rubella on Shell's☆32Updated last year
- Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.☆22Updated 11 months ago
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".☆58Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆26Updated 9 months ago
- Android pentesting frameworks, and a knife for frida payloads.☆38Updated last year
- TFRv2 for RCe :[EXEMPT trivial], Bypasser for anti-virus and Ev-Pentesting. Collections of 592 payloads for Android, Windows, and macOS.☆121Updated last year
- For radio frequency research severe damage to privacy or modify wireless devices.☆16Updated 11 months ago
- The Network Relay Execution Tool.☆17Updated 11 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆10Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many o…☆48Updated last year
- 🗝 BotNet ( .NET ) Source Codes☆14Updated last year
- Seven Degrees of Domain Admin☆84Updated 10 months ago
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Updated 10 months ago
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?☆12Updated last year
- Command and aontrol, server and implants for stealth red-teaming mode.☆11Updated 11 months ago
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Updated last year
- MFA and 2FA chainers, authentication PenTesting frameworks.☆19Updated last year
- 𝗬𝗔𝗥𝗔 for offensive, YARA can do that!?☆11Updated last year
- Pegasus, the Spyware that represents a significant Offensive Colonel.☆56Updated last year
- Juggernaut show Attacks for MFA from Apple ID.☆28Updated 11 months ago
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.☆20Updated last year
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.☆12Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.☆45Updated 8 months ago
- rootkit and kernel pentesting for Linux, most advanced malware for SUID.☆10Updated last year
- WPA frequency sessions, framworks of customs firmware and intensity of RF.☆13Updated last year
- Sharp and GPO abuse for PrivEsc, Data Collector for BloodHound and BlackMarlinExec.☆105Updated 4 months ago
- NOC is an Integration Bypasser, Change PoC Binary to quirks of working with the LLVM.☆11Updated last year
- yarn BHCE, Six Degrees of Domain Admin. Using Neo4j to store Networks objects and relationships as graph nodes and edges, enabling path-f…☆55Updated 6 months ago
- Offshore the Maze Octopus for Remote Admin Access.☆27Updated last year