d1mov / evillnk
Python GUI based tool to generate lnk files with a payload and decoy files embedded inside.
☆16Updated 5 months ago
Related projects ⓘ
Alternatives and complementary repositories for evillnk
- OnlyRAT is the only RAT you'll ever need. We will be able to use this tool to remotely command and control windows computers.Once install…☆143Updated last month
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆263Updated 4 months ago
- Tool to evade Antivirus With Different Techniques☆162Updated last year
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆28Updated 4 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 9 months ago
- Python Based Crypter That Can Bypass Any Kinds Of Antivirus Products☆330Updated 10 months ago
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- zerosum0x0's Koadic☆268Updated 2 years ago
- ☆18Updated 3 weeks ago
- Generate FUD backdoors☆238Updated last year
- AV evading OSX Backdoor and Crypter Framework☆275Updated 8 months ago
- Autofill Phishing☆49Updated 4 months ago
- This python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!☆404Updated 4 months ago
- The Havoc Framework☆51Updated 2 years ago
- DucKey Logger [Duck Key Logger] is a PowerShell based keylogger for the USB Rubber Ducky. I believe it is currently the most advanced one…☆81Updated last year
- ScareCrow - Payload creation framework designed around EDR bypass.☆257Updated last year
- POC Pdf-exploit builder on C#☆124Updated 8 months ago
- Command & Control-Framework created for collaboration in python3☆309Updated last year
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆147Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆93Updated 10 months ago
- What the name says....☆86Updated last month
- Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s☆527Updated 3 months ago
- Obfuscate and run .exe files in a powershell script☆13Updated last year
- ☆115Updated 7 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆115Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆280Updated last month
- Malicious Macro Generator for LibreOffice/OpenOffice☆16Updated last year