decay88 / LimeUSB
Malware USB Spread | POC | Example
☆9Updated 6 years ago
Alternatives and similar repositories for LimeUSB:
Users that are interested in LimeUSB are comparing it to the libraries listed below
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago
- HTTP BOTNET☆7Updated last year
- Simple class to search and upload files☆27Updated 5 years ago
- ☆17Updated 5 years ago
- Phoenix based exploit kit for educational purpose.☆17Updated 6 years ago
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- ☆16Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13Updated 6 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆13Updated 8 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- Disabling Windows Defender & downloading payload☆20Updated 4 years ago
- Download payload to disk and install it to startup then melt.☆35Updated 6 years ago
- ☆14Updated 5 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- first commit☆10Updated 8 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Red Team C2 and Post Exploitation Code☆36Updated last month
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 10 years ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago