darkarp / malkitLinks
Full malware Kit
☆58Updated 4 years ago
Alternatives and similar repositories for malkit
Users that are interested in malkit are comparing it to the libraries listed below
Sorting:
- Modern problems require modern solutions☆32Updated 2 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- An open source RansomWare☆89Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- "PRinter Exploitation Toolkit" LAN automation tool☆209Updated 6 years ago
- Get a reverse shell within 15 seconds on both Windows or Unix based systems, using the Digispark developement board.☆43Updated 4 years ago
- Hiding implants in HTML files☆65Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆33Updated 6 years ago
- The Python Password-Protected Obfuscator☆33Updated 6 years ago
- Automatically spin up infra for phishing☆64Updated 5 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owens☆27Updated 4 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Updated last year
- Is command prompt blocked on your school/work computers? Here is an easy fix!☆21Updated 6 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 5 years ago
- Transform your batch (bat) script into one binary.exe☆50Updated last year
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 7 years ago
- Use Invoke-PSImage to deliver a payload in an Image☆52Updated 7 years ago
- some python3 functions to add spreading features to any python backdoor☆55Updated 8 years ago
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- Android and iOS source for the Empire mobile app☆89Updated 6 years ago
- A cross-platform one-liner to steal a user's cookies from Chrome <- cool☆87Updated 6 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆96Updated 4 years ago
- Creates a .lnk file with unicode chars that reverse the file extension and adds a .txt to the end to make it appear as a textfile. Paylo…☆114Updated 4 years ago
- Windows 10 De-Clutter script☆24Updated 5 years ago
- Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- using VBS to download and install a powershell malware☆41Updated 6 years ago