davidtavarez / pinky
pinky - The PHP mini RAT (Remote Administration Tool)
☆72Updated 6 years ago
Alternatives and similar repositories for pinky:
Users that are interested in pinky are comparing it to the libraries listed below
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆49Updated 7 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- Backdoor en powershell vía Telegram☆30Updated 7 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- A simple python reverse shell written just for fun.☆64Updated 2 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆18Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆22Updated 6 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆98Updated 7 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- HTTP BOTNET☆8Updated last year
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 7 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- Capstone: Keylogger Trojan☆35Updated 6 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆83Updated 6 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated 2 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆60Updated 9 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆79Updated last year
- Small backdoor using cookie.☆59Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆25Updated last year
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆97Updated 2 years ago