byt3n33dl3 / PyMalleasusC2Links
World's most advanced mobile security frameworks and surveillance.
☆66Updated last week
Alternatives and similar repositories for PyMalleasusC2
Users that are interested in PyMalleasusC2 are comparing it to the libraries listed below
Sorting:
- Dynamic bypass and Anti-virus evasion collections, pentesting frameworks for Infra assets, following (https://www.greenbone.net/) and (ht…☆121Updated last year
- Android attack for root-ed Android kit, including ASLR and SSL-pinning test mechanism.☆39Updated last year
- Automated exploit scanners for public CCTV's services and other polaroid public stuff.☆23Updated last year
- CLI application for credentials recovery, converting and multi-threaded cracking mechanism for online and offline scenario.☆85Updated 10 months ago
- World's most advanced Mach-O and TCC binary malware for macOS or Unix-based distro.☆43Updated last year
- GUI pentesting frameworks for Android and iOS sandbox evasion and bypass modules mechanism.☆209Updated last year
- Enterprise level of Parallelization SSH (Concurrency), Logon Penetration Testing.☆26Updated 10 months ago
- iCloud security assessor.☆27Updated last year
- Latest WannaCry ransomware version (2.0) for adversary emulation assessment, encripting Program Files (x86), Program Files (x64), Program…☆60Updated last year
- Obfuscated Pegasus Spyware.☆28Updated last year
- An Open source Pentesting Software for Mapping Injection points to Takeover.☆53Updated 11 months ago
- Radio frequency cybersecurity architech research, based on latest severe damage to privacy or modify wireless devices.☆16Updated last year
- Password hash decryption utilities, fastest and most advanced password cracking. Supports hundreds of hash & cipher types, runs on many o…☆48Updated last year
- Backdoor for Rubella on Shell's☆32Updated last year
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆49Updated 5 months ago
- 🗝 BotNet ( .NET ) Source Codes☆14Updated last year
- An Android RAT creator toolkit.☆23Updated 4 months ago
- The Network Relay Execution Tool.☆17Updated last year
- A dos (denial of service) attack for local networks using dead router attack (IPv6) and ARP attack (IPv4) simultaneously☆125Updated 5 months ago
- decompiled pegasus_spyware☆98Updated 4 years ago
- DarkGPT Lite is a specialized CLI tool providing unrestricted conversations with AI for cybersecurity research purposes☆29Updated 5 months ago
- Prevent users from accessing online services. Distributed Denied of Service Attack server that cuts off targets or surrounding Infrastruc…☆10Updated last year
- Docker Payloads (Bypass) Data at the endpoint when running NestJS APK.☆17Updated last year
- Release Neo the Evil-Ducky, a scripts for rubber-ducky USB.☆12Updated last year
- A social engineering toolkit for performing smishing, and other sms attacks☆100Updated last year
- A swiss army Knife for Penetration testing Networks and Active Directory.☆44Updated 9 months ago
- Crawler malware through SMB share or LDAP queries, (require Administrator access for DCSync atttack).☆12Updated last year
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆90Updated 6 months ago
- Chaos Ransomware builder☆13Updated 3 years ago
- Seven Degrees of Domain Admin☆84Updated 11 months ago