g0tmi1k / msfpc
MSFvenom Payload Creator (MSFPC)
☆1,253Updated 3 years ago
Alternatives and similar repositories for msfpc:
Users that are interested in msfpc are comparing it to the libraries listed below
- Undetectable Windows Payload Generation☆1,584Updated 2 years ago
- Python antivirus evasion tool☆1,406Updated last year
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆910Updated 5 years ago
- Find exploits in local and online databases instantly☆1,712Updated 3 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,404Updated 6 years ago
- venom - C2 shellcode generator/compiler/handler☆1,841Updated last year
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,718Updated 2 months ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,700Updated 5 months ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆722Updated 2 years ago
- AntiVirus Evasion Tool☆1,684Updated last year
- Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates.☆1,308Updated 3 years ago
- Email recon made fast and easy, with a framework to build on☆953Updated 2 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆1,432Updated last year
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,106Updated 7 years ago
- Efficient and advanced man in the middle framework☆2,088Updated 2 years ago
- Unified repository for different Metasploit Framework payloads☆1,812Updated last month
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,174Updated 2 years ago
- Plugins for Metasploit Framework☆447Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- Bruteforcing from various scanner output - Automatically attempts default creds on found services.☆2,200Updated this week
- Popular Pentesting scanner in Python3.6 for SQLi/XSS/LFI/RFI and other Vulns☆1,496Updated last year
- Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's po…☆3,807Updated last year
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆974Updated 7 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,267Updated 3 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,146Updated 3 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,353Updated 4 years ago
- Veil Evasion is no longer supported, use Veil 3.0!☆1,835Updated 3 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆603Updated 3 years ago
- Miscellaneous exploit code☆1,548Updated last year
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,111Updated 2 years ago