d1mov / evillnk
Python GUI based tool to generate lnk files with a payload and decoy files embedded inside.
☆18Updated 7 months ago
Alternatives and similar repositories for evillnk:
Users that are interested in evillnk are comparing it to the libraries listed below
- Collection of evilginx2's phishlets as training materials in Phishing Operations by Archonlabs Training☆21Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆29Updated 6 months ago
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆68Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- Living Off The Land (LOTL) persistent Reverse shell☆94Updated last year
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆275Updated 7 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆88Updated 11 months ago
- Many Evilginx2 Phishlets Uptodate☆48Updated last year
- Social Engineering Browser Update Attack.☆54Updated last year
- Repo containing cracked red teaming tools.☆137Updated 6 months ago
- Tool to evade Antivirus With Different Techniques☆167Updated last year
- What the name says....☆89Updated 4 months ago
- This is for Ethical Use only!☆19Updated this week
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆73Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆27Updated last month
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆57Updated 3 years ago
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆100Updated this week
- Fud Crypter & Downloader☆17Updated last year
- capNcook - a dark web exploration tool☆57Updated 9 months ago
- Simple Powershell Http shell With WEB UI☆70Updated last month
- Browser streaming MITM proxy☆55Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆130Updated 6 months ago
- POC Pdf-exploit builder on C#☆129Updated 10 months ago
- (Beta) RES0LUTI0N is a malware builder undetected by Windows Defender with an anti-VM coded in python and C#. It uses a triple layer rand…☆45Updated 8 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆37Updated 3 weeks ago
- Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3☆153Updated last year
- ☆21Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆125Updated 6 months ago