byt3n33dl3 / IsabellaLinks
Rootkit and Kernel attack kit, ๐๐๐ฎ๐ฏ๐ฒ๐น๐น๐ฎ program Enables Cyber Attacks to gain access from Machines without being detected.
โ10Updated 11 months ago
Alternatives and similar repositories for Isabella
Users that are interested in Isabella are comparing it to the libraries listed below
Sorting:
- Encrypting directory and access. Execute the Commands Based on external inputs RCE.โ11Updated last year
- A Sharp Knife Data Collector for BloodHound and BlackMarlinExec.โ105Updated 2 months ago
- Github Profile Readmeโ36Updated 3 months ago
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.โ17Updated last year
- Trojan GUI and Victims Display panel Orbitโ11Updated 2 months ago
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.โ12Updated last year
- Configurations and Deprecated payloads. Some useful scripts for Cobaltstrike.โ17Updated 11 months ago
- Kerberos Attacks. EXECTRINITY focuses on the acquisition of TGS. Specifically operating under Active Directory.โ43Updated 10 months ago
- Six Degrees of Domain Adminโ55Updated 4 months ago
- Remote access Trojan based (Client) After the Malware hits the Kernel.โ11Updated last year
- P O I S O N I N Gโ20Updated last year
- Worm roulette, a Miscellaneous tools for Gambllers. Don't do it guysโ9Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.โ44Updated 6 months ago
- ๐ BotNet ( .NET ) Source Codesโ14Updated last year
- Kerberos Attacks From Networks or Domain controller log Perspective through HMAC in exchanges.โ30Updated last year
- Six Degrees of Enterprise Domain Adminโ27Updated last month
- Offshore the Maze Octopus for Remote Admin Access.โ27Updated last year
- Weaponizing Nim, with the elegance of modern logic programming language. Nim can do that!?โ12Updated last year
- Seven Degrees of Domain Adminโ84Updated 8 months ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cโฆโ48Updated last year
- (Cracking Authentication) Attacking a Services and attempts to exploit the MFA processes.โ19Updated last year
- Backdoor for Rubella on Shell'sโ32Updated last year
- Ronin the Shogun for XSS and XSRF Attacks.โ14Updated 10 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastrucโฆโ10Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.โ53Updated 8 months ago
- Nikto the Alienware : Advance web scanner, Identify by scanning for Misconfigurations and Information disclosures.โ17Updated 11 months ago
- Combining "Authentication" to convey on Active Directory. Advanced Kerberos attacks.โ15Updated last year
- Kerberos Attacks by cracking the system or router that provides a gateway for Active Directory.โ20Updated last year
- Hooking frequency Sessions, a bundle of customs firmware and intensity of RF.โ13Updated last year
- ๐ฐ๐ช WannaCry ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ. This malware spread by using a vulnerability Exploit Called "EternalBlue".โ56Updated last year