fboldewin / FastCashMalwareDissected
Operation Fast Cash - Hidden Cobra‘s AIX PowerPC malware dissected
☆25Updated 6 years ago
Alternatives and similar repositories for FastCashMalwareDissected:
Users that are interested in FastCashMalwareDissected are comparing it to the libraries listed below
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Miscellaneous exploit code☆19Updated 8 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 7 years ago
- ☆51Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆22Updated 7 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- Carve shellcode within the memory using restrictive character set☆8Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Red Team Tool Kit☆15Updated 5 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- Software exploitation training material☆15Updated 7 years ago
- This is a Shell Script to setup NTLM hash sniffing using the Raspberry Pi Zero. This tool can be used during Red Team assessments by atta…☆22Updated 7 years ago
- Search Email Accounts (OWA) for Passwords, PAN numbers as well as other Keywords☆39Updated 6 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- pen testing scripts☆11Updated 4 years ago
- ☆15Updated 2 years ago
- only for 31337☆22Updated 8 years ago