byt3n33dl3 / PyMalleasusC2Links
World's most advanced mobile security frameworks and surveillance.
☆73Updated 2 months ago
Alternatives and similar repositories for PyMalleasusC2
Users that are interested in PyMalleasusC2 are comparing it to the libraries listed below
Sorting:
- Defense evasion collections and pentesting frameworks for assessment, following Greenbone and (https://www.openVAS.org/).☆125Updated last year
- CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.☆85Updated last year
- Android attack for root-ed Android kit, including ASLR and SSL-pinning test mechanism.☆39Updated last year
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.☆23Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆26Updated last year
- Obfuscated Pegasus Spyware.☆30Updated last year
- World's most advanced Mach-O and TCC binary malware for macOS or Unix-based distro.☆44Updated last year
- Latest WannaCry ransomware version (2.0) for adversary emulation assessment, encripting Program Files (x86), Program Files (x64), Program…☆66Updated last year
- Adversarial frameworks for Android and iOS sandbox evasion.☆230Updated last year
- iCloud security assessor.☆27Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Updated last year
- Backdoor for Rubella on Shell's☆32Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many o…☆48Updated last year
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Updated last year
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.☆13Updated last year
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆61Updated 7 months ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆32Updated 11 months ago
- 🗝 BotNet ( .NET ) Source Codes☆14Updated last year
- An Android RAT creator toolkit.☆26Updated 6 months ago
- It is an automated phishing tool that includes more than 30 phishing templates.☆98Updated last year
- Seven Degrees of Domain Admin☆84Updated last year
- decompiled pegasus_spyware☆118Updated 4 years ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆105Updated 2 years ago
- Six Degrees of Enterprise Domain Admin☆28Updated 6 months ago
- ☆30Updated last year
- Tool for Wifi Network Attacks☆128Updated 10 months ago
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).☆12Updated last year
- DarkCool All Tools For Hacking Activity! List:~ Exploiter, Checker, Webshell Finder, Grabber, Searching, Bruteforce, Random, And Others T…☆171Updated last year
- Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will f…☆112Updated 3 months ago
- AirHunt is a versatile and user-friendly wireless network hacking toolkit designed for security professionals and enthusiasts. With a wid…☆65Updated 2 years ago