darkarp / malkit
Full malware Kit
☆57Updated 4 years ago
Alternatives and similar repositories for malkit:
Users that are interested in malkit are comparing it to the libraries listed below
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- An open source RansomWare☆86Updated 5 years ago
- A ctypes powered python keylogger.☆105Updated 5 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆26Updated 4 years ago
- Modern problems require modern solutions☆31Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆205Updated 5 years ago
- Simple Karma Attack☆67Updated 4 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated 2 years ago
- SubZone - Subdomains, Dns records, & more! || Python tutorial || Certificate authority abuse || Adavnced || Hacking/Info-Sec ||☆44Updated 2 months ago
- Arduino Rubber Ducky Framework☆107Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 8 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- PyEvade is a simple tool to bypass many antivirus solutions on windows for metasploit payloads.☆16Updated 7 years ago
- Backdoor en powershell vía Telegram☆30Updated 7 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Social Engineering Toys☆36Updated 9 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- ☆51Updated 4 years ago
- Hiding implants in HTML files☆64Updated 4 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 3 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 7 years ago