cinaaaa / HIROO
π HIROO is an FUD Remote Administration Tool (RAT) Generator
β15Updated 5 years ago
Alternatives and similar repositories for HIROO:
Users that are interested in HIROO are comparing it to the libraries listed below
- recover Firefox and more browsers loginsβ49Updated 3 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.β14Updated 3 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.β15Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago
- pure python remote adb scanner + nmap scan moduleβ21Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershellβ22Updated 4 months ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.β27Updated 5 years ago
- Inject Metasploit Shell Code in Legitimate Processβ11Updated 4 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executableβ¦β10Updated 3 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLYβ25Updated 6 years ago
- Windows/Linux - ReverseShellBackdoor Frameworkβ48Updated 5 years ago
- Bash script to crack rdp with THC-Hydraβ16Updated 3 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NETβ21Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.β17Updated 4 years ago
- Perl IRC Bot for scanning and exploiting VNC servers on several ports using Mojo::IRC module.β13Updated 3 years ago
- Collection of cracked malwareβ14Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploitsβ11Updated 5 years ago
- Password Recovery Toolkit For Windows Written in Python 3β26Updated last year
- Abuses Powershell Profilesβ13Updated 9 years ago
- π Reverse shell written on python3β14Updated 4 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricksβ11Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Imageβ52Updated 7 years ago
- Repository of tools used in my blogβ51Updated last year
- A simple site clonerβ25Updated 7 years ago
- Automated encryption utilities and installationβ12Updated 4 years ago
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.β18Updated 11 years ago
- Virus for windows 100% FUD & bypass any AVβ21Updated last year
- AIL framework - Analysis Information Leak frameworkβ8Updated 7 years ago
- Access Windows 10 without passwordβ13Updated 4 years ago
- βπ‘οΈ WeDefend - Monitor and Protect Windows from Remote Access Trojanβ25Updated 6 years ago