drcrypterdotru / Zeus-Grabber
Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H
β30Updated 4 months ago
Alternatives and similar repositories for Zeus-Grabber:
Users that are interested in Zeus-Grabber are comparing it to the libraries listed below
- Boost website hits by generating requests from multiple proxy IPs.β56Updated last year
- π Advanced Rat controllable by a telegram bot with many commands and functions.β13Updated 8 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORKβ14Updated last year
- Generate Undetectable Metasploit Payload in a simple wayβ36Updated last year
- Perform With Mass Exploiter In Joomla 4.2.8.β34Updated last year
- Generate FUD Droppers that are undetectable by popular AV'sβ31Updated last year
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, aβ¦β24Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pagβ¦β122Updated last year
- UAdmin Phishlets for common sitesβ13Updated 2 years ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)β100Updated last year
- ZeroShell Manager (GUI) is a Tool designed to help users manage their Webshellsβ11Updated 5 months ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminalβ46Updated last year
- Python-based Google dork generator that creates search patterns for web reconnaissance. Combines custom patterns, site lists, and search β¦β28Updated 2 months ago
- A simple script to obfuscate batch(bat) code easilyβ21Updated last year
- PassBreakerβ58Updated 10 months ago
- ProxyChecker Made in NodeJSβ36Updated 2 years ago
- Nmap & SQL injection automation toolβ30Updated 4 months ago
- A windows Wifi Brute forcing utility which is an extremely old method but still works without the requirement of external dependencies.β75Updated 7 months ago
- OpenSSH 9.1 vulnerability mass scan and exploitβ8Updated last year
- You should never use malware to infiltrate a target system. With the skill of writing and exploiting technical codes, you can do the bestβ¦β68Updated 11 months ago
- Clipboard poisoning attack.β56Updated 4 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP β¦β35Updated last year
- Here are +200 different rats some with source codeβ88Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data andβ¦β29Updated 10 months ago
- Kali Packerge Managerβ58Updated last year
- xdebug 2.5.5 RCE exploitβ30Updated last month
- steal chrome saved passwords "undetectable"β49Updated 2 years ago
- Generate FUD Ransomeware For Windows, Linux and MAC OSβ22Updated last year
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilitiesβ¦β28Updated this week
- Hacking with PasteJacking techniqueβ21Updated 8 months ago