fgutica / Linux-Python-Backdoor
☆11Updated this week
Related projects: ⓘ
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Updated 6 years ago
- Stealthy DDE Exploit Payload generator and injector for DOCX files☆16Updated 6 years ago
- ☆18Updated this week
- recover Firefox and more browsers logins☆47Updated 2 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Updated last year
- An MITM based Social Engineering (Phishing)attack POC!☆9Updated 10 years ago
- Just another tool to screenshot web servers☆16Updated last year
- Interactive Post Exploitation Tool☆36Updated 4 years ago
- ☆21Updated this week
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- ☆19Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆21Updated 6 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 9 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated last year
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- ☆14Updated this week
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Unofficial WhatCMS API package☆43Updated 3 years ago
- An0n 3xPloiTeR Shell☆35Updated 4 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- ☆23Updated this week
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆26Updated 7 years ago
- A collection of curated Java Deserialization Exploits☆9Updated 6 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆21Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago