byt3n33dl3 / Grizzly
Trojan GUI && display panel
☆11Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for Grizzly
- Worm roulette, a Miscellaneous tools for Gambllers. Don't do it guys☆8Updated 4 months ago
- Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.☆16Updated 4 months ago
- offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass sev…☆19Updated 4 months ago
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.☆13Updated 3 months ago
- Rootkit and Kernel attack kit, 𝗜𝘀𝗮𝗯𝗲𝗹𝗹𝗮 program will enables cyber attacks to gain access to and infiltrate data from machines wi…☆10Updated 3 months ago
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security A…☆41Updated 5 months ago
- Six Degrees of Enterprise Domain Admin☆13Updated last month
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password c…☆41Updated 3 months ago
- Open source Penetration Testing Software for automatic Injection attacks, Exploiting query Injections flaw and Taking over of Database se…☆38Updated 2 weeks ago
- 🗝 BotNet ( .NET ) Source Codes☆13Updated 6 months ago
- Seven Degrees of Domain Admin☆70Updated 2 weeks ago
- This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. CARNOTAURUS …☆31Updated 6 months ago
- Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of 𝗧𝗲𝗲𝘁𝗵 cybertooth && 𝗝𝗼𝗵…☆60Updated 4 months ago
- For radio frequency research ( RF attack ) this script can cause severe damage to an individual's privacy ( trust-attack ) by enabling at…☆12Updated 2 months ago
- Remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the ker…☆10Updated 4 months ago
- Advance web scanner, It's Designed to identify various Security vulnerabilities in web applications by scanning for misconfigurations, in…☆15Updated 3 months ago
- Offensive Remote Access for any smartphones, most advanced on Android. crowdown is software that gives a person full control of another p…☆26Updated 3 months ago
- Pegasus, the Spyware that represents a significant threat to Privacy and Security, showcasing the capabilities of modern surveillance tec…☆23Updated 4 months ago
- The most advanced GUI frontend && CLI RAT for MacOS and OSX distro, Remote Access Tool. Penetrate the SSL and Security system of Unix wit…☆21Updated last month
- TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. …☆65Updated 4 months ago
- 𝗡.𝗢.𝗖 is a source code to bypass antivirus, Change some strings in the PoC binary or script to get it pass the AV. This can be a time …☆10Updated 3 months ago
- Apple iD & Credentials BruteForcer. iCloud Apple ID Dictionary Attack that Bypasses Account Lockout restrictions and Secondary Authentica…☆12Updated 2 months ago
- ⛓️💥 Notorious Smartphones Malware, for Remote Administration and Access tools, Which include Remote Device control and advanced Spyware…☆101Updated last month
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactions☆265Updated 3 months ago
- Snaffler reimplementation in Python - https://github.com/SnaffCon/Snaffler☆86Updated last week
- NukeAMSI is a powerful tool designed to neutralize the Antimalware Scan Interface (AMSI) in Windows environments.☆108Updated last week
- "AMSI WRITE RAID" Vulnerability that leads to an effective AMSI BYPASS☆201Updated 2 weeks ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆154Updated 2 weeks ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆190Updated 5 months ago
- Manage variables effectively when playing CTFs☆10Updated 5 months ago