byt3n33dl3 / Crawler_v2Links
Remote access Trojan based (Client) After the Malware hits the Kernel.
โ11Updated last year
Alternatives and similar repositories for Crawler_v2
Users that are interested in Crawler_v2 are comparing it to the libraries listed below
Sorting:
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.โ17Updated 11 months ago
- Rootkit and Kernel attack kit, ๐๐๐ฎ๐ฏ๐ฒ๐น๐น๐ฎ program Enables Cyber Attacks to gain access from Machines without being detected.โ10Updated 11 months ago
- (Cracking Authentication) Attacking a Services and attempts to exploit the MFA processes.โ19Updated last year
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.โ12Updated last year
- P O I S O N I N Gโ20Updated last year
- Nikto the Alienware : Advance web scanner, Identify by scanning for Misconfigurations and Information disclosures.โ17Updated 11 months ago
- Kerberos Attacks. EXECTRINITY focuses on the acquisition of TGS. Specifically operating under Active Directory.โ43Updated 10 months ago
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.โ30Updated last year
- Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.โ15Updated last year
- Six Degrees of Domain Adminโ55Updated 4 months ago
- Hooking frequency Sessions, a bundle of customs firmware and intensity of RF.โ13Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.โ44Updated 6 months ago
- Encrypting directory and access. Execute the Commands Based on external inputs RCE.โ11Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.โ17Updated last year
- Offshore the Maze Octopus for Remote Admin Access.โ27Updated last year
- A Sharp Knife Data Collector for BloodHound and BlackMarlinExec.โ105Updated 2 months ago
- Github Profile Readmeโ36Updated 3 months ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cโฆโ48Updated last year
- Seven Degrees of Domain Adminโ84Updated 8 months ago
- Worm roulette, a Miscellaneous tools for Gambllers. Don't do it guysโ9Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.โ13Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.โ53Updated 8 months ago
- ๐ BotNet ( .NET ) Source Codesโ14Updated last year
- Trojan GUI and Victims Display panel Orbitโ11Updated 2 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucโฆโ10Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.โ20Updated last year
- Backdoor for Rubella on Shell'sโ32Updated last year
- NOC is an Integration Bypasser, Change PoC Binary to quirks of working with the LLVM.โ11Updated 11 months ago
- Six Degrees of Enterprise Domain Adminโ27Updated last month
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?โ12Updated last year