byt3n33dl3 / PyMalleasusC2Links
Pegasus, the Spyware that represents a significant Offensive Colonel.
☆62Updated last year
Alternatives and similar repositories for PyMalleasusC2
Users that are interested in PyMalleasusC2 are comparing it to the libraries listed below
Sorting:
- TFRv2 for RCe, dynamic bypass and PenTesting for anti-virus. Collections of payloads for Android, Windows, and macOS.☆120Updated last year
- Android pentesting frameworks, and a knife for frida payloads.☆39Updated last year
- Automated Exploit scanners for public Camera, CCTV's, and Capture Devices.☆23Updated 11 months ago
- Attacking Assimilation-bridge by looping with SNMPv3 & GPG, usingas CPUs, FPGAs cycles: 0x989, most advanced password and logon recovery.☆85Updated 10 months ago
- Obfuscated Pegasus Spyware.☆29Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆26Updated 10 months ago
- The most advanced Mach-O binary malware for macOS or Unix-based distro.☆43Updated last year
- 𓆰𓆪 WannaCry 𝗥𝗮𝗻𝘀𝗼𝗺𝘄𝗮𝗿𝗲. This malware spread by using a vulnerability Exploit Called "EternalBlue".☆59Updated last year
- An Ounce Antler Bullet [CVSS:3.1] & EoP [220066255]. Penetrate iOS and Android☆207Updated 11 months ago
- Juggernaut show Attacks for MFA from Apple ID.☆27Updated last year
- For radio frequency research severe damage to privacy or modify wireless devices.☆16Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Updated 10 months ago
- Backdoor for Rubella on Shell's☆32Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many o…☆48Updated last year
- 🗝 BotNet ( .NET ) Source Codes☆14Updated last year
- Release Neo the Evil Ducky, A scripts into any Hardware or drive Devices.☆12Updated last year
- The Network Relay Execution Tool.☆17Updated last year
- Seven Degrees of Domain Admin☆84Updated 10 months ago
- Remote access Trojan based (Client) After the Malware hits the Kernel.☆12Updated last year
- An Android RAT creator toolkit.☆21Updated 3 months ago
- DarkGPT Lite is a specialized CLI tool providing unrestricted conversations with AI for cybersecurity research purposes☆26Updated 4 months ago
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Updated last year
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆10Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.☆45Updated 8 months ago
- Six Degrees of Enterprise Domain Admin☆27Updated 3 months ago
- WPA frequency sessions, framworks of customs firmware and intensity of RF.☆13Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆87Updated 5 months ago
- Fud Crypter & Downloader☆23Updated 2 years ago
- Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers every…☆28Updated 8 months ago
- Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will f…☆102Updated 3 weeks ago