drcrypterdotru / ZeroShell-ManagerLinks
ZeroShell Manager (GUI) is a Tool designed to help users manage their Webshells
☆16Updated 9 months ago
Alternatives and similar repositories for ZeroShell-Manager
Users that are interested in ZeroShell-Manager are comparing it to the libraries listed below
Sorting:
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆42Updated 9 months ago
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- ☆21Updated 4 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.☆80Updated last year
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆39Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the best…☆80Updated 2 months ago
- Perform With Mass Exploiter In Joomla 4.2.8.☆34Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Perform With Massive Wordpress Enumeration☆11Updated last year
- SMTP checker to check Mail Access via SMTP☆40Updated 3 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Gecko Backdoor is a most powerful web php backdoor.☆124Updated 2 months ago
- Dorkey is Dork generator For Sql Injection It includes Php Aspx And other extension Its Simple Fast And Lightweight Sqli Dork Generator☆15Updated 3 years ago
- Cryptocurrency wallet decryption program written in C# .NET 7.0☆19Updated 7 months ago
- Generate FUD Droppers that are undetectable by popular AV's☆30Updated last year
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆108Updated last year
- AutoExploiter Wordpress , Joomla , Drupal☆17Updated 7 years ago
- Tool to parse Stealer Logs.☆17Updated last year
- This is power full BotNet☆41Updated last year
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆17Updated last year
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Control a system remotely via telegram☆44Updated 8 months ago
- Layer 7 DDoS Panel with Cloudflare Bypass ( UAM, CAPTCHA, BFM, etc.. )☆23Updated 2 years ago
- Auto Exploiter By CYBER KING SQUAD☆8Updated 2 years ago
- Website Phishing Source Code☆31Updated 3 years ago
- UAdmin Phishlets for common sites☆14Updated last month
- Securely fetch saved passwords from Google☆9Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- WordPress XML-RPC & WP-Login Bruteforce + Auto Uploader Powerful asynchronous bruteforce tool for WordPress sites via wp-login.php and …☆16Updated 2 months ago