byt3n33dl3 / EXAPegasusLinks
Obfuscated Pegasus Spyware.
☆28Updated last year
Alternatives and similar repositories for EXAPegasus
Users that are interested in EXAPegasus are comparing it to the libraries listed below
Sorting:
- Defense evasion collections and pentesting frameworks for assessment, following Greenbone and (https://www.openVAS.org/).☆124Updated last year
- Android attack for root-ed Android kit, including ASLR and SSL-pinning test mechanism.☆39Updated last year
- World's most advanced mobile security frameworks and surveillance.☆70Updated last month
- CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.☆84Updated last year
- Latest WannaCry ransomware version (2.0) for adversary emulation assessment, encripting Program Files (x86), Program Files (x64), Program…☆64Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Updated last year
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).☆12Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many o…☆48Updated last year
- BloodHound Attack Research Kit. BARK is an Attack Kit for Attack path Management.☆13Updated last year
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.☆12Updated last year
- Adversarial frameworks for Android and iOS sandbox evasion.☆221Updated last year
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆26Updated last year
- Playing with WPA frequency sessions framworks, check-lists of customs firmware and intensity of RF.☆13Updated last year
- World's most advanced Mach-O and TCC binary malware for macOS or Unix-based distro.☆43Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.☆44Updated 10 months ago
- Seven Degrees of Domain Admin☆84Updated last year
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.☆23Updated last year
- Backdoor for Rubella on Shell's☆32Updated last year
- Active Directory kerberos attack framworks.☆43Updated last year
- Internal data collector for BloodHound and BlackMarlinExec pathway strategies through LDAP.☆107Updated 7 months ago
- iCloud security assessor.☆26Updated last year
- MFA and 2FA chainers, authentication PenTesting frameworks.☆19Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.☆30Updated last year
- 🗝 BotNet ( .NET ) Source Codes☆14Updated last year
- Support CobaltStrike kit for File System (NTFS/NPFS) Minifilter Drivers error handling.☆17Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Updated last year
- WiFi Pentesting on Mac filters bypass and SSID manipulation.☆21Updated last year
- Hackcctv☆215Updated 6 months ago
- Nikto the Alienware, scanning for misconfigurations and Information disclosures on WebApp.☆17Updated last year