hackernese / SneakyEXELinks
Embedding a "UAC-Bypassing" function into your custom payload
☆99Updated 3 years ago
Alternatives and similar repositories for SneakyEXE
Users that are interested in SneakyEXE are comparing it to the libraries listed below
Sorting:
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆105Updated 7 years ago
- Transferring Backdoor Payloads with BMP Image Pixels☆83Updated 2 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- A simple python reverse shell written just for fun.☆65Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- Passwordless RDP Session Hijacking☆69Updated 3 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆84Updated 5 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable script☆24Updated 5 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 6 years ago
- A simple PowerShell script that we can use for easing the process of creating a reverse shell and automating Meterpreter update☆67Updated 5 years ago
- Passwords Recovery Tool☆226Updated 4 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆42Updated 7 years ago
- pinky - The PHP mini RAT (Remote Administration Tool)☆77Updated 6 years ago
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to …☆110Updated 5 years ago
- Simple python backdoor with Ngrok tunnel support☆205Updated last year
- Generator of malicious Ace files for WinRAR < 5.70 beta 1☆125Updated 6 years ago
- A PowerShell-based toolkit and framework consisting of a collection of techniques and tradecraft for use in red team, post-exploitation, …☆187Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Updated 5 years ago
- Uses Invoke-Shellcode to execute a payload and persist on the system.☆115Updated 8 years ago
- Tool aided persistence via Windows URI schemes abuse☆85Updated 5 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆54Updated 6 years ago
- KeyLogger for Linux Systems☆70Updated 4 years ago
- Red Login: SSH Brute-force Tools☆104Updated 7 years ago
- ☆51Updated 11 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- Automate Metasploit scanning and exploitation☆116Updated last month
- Web Browser Hooking Framework. Manage, execute and assess web browser vulnerabilities☆39Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- Tool for password spraying RDP☆96Updated 6 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago