Spoof file icons and extensions in Windows
☆190Feb 6, 2026Updated 3 weeks ago
Alternatives and similar repositories for ExtensionSpoofer
Users that are interested in ExtensionSpoofer are comparing it to the libraries listed below
Sorting:
- ☆25Mar 21, 2020Updated 5 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆19Sep 6, 2019Updated 6 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆66Feb 11, 2018Updated 8 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- File Write Weapon for Privilege Escalation To get SYSTEM☆18May 29, 2020Updated 5 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 3 years ago
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆353Apr 20, 2022Updated 3 years ago
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder☆277Aug 1, 2022Updated 3 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆93May 15, 2021Updated 4 years ago
- Nice try reading NTDLL from disk, nerd.☆19Apr 18, 2022Updated 3 years ago
- spoof an extension of any file by using U+202E Unicode character☆15Nov 5, 2021Updated 4 years ago
- Remove API hooks from a Beacon process.☆14Sep 18, 2021Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Windows active user credential phishing tool☆283Mar 10, 2020Updated 5 years ago
- This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)☆77Oct 1, 2020Updated 5 years ago
- Python AV Evasion Tools☆520Oct 14, 2025Updated 4 months ago
- ☆17Jan 2, 2020Updated 6 years ago
- PoC code from blog☆16Mar 10, 2020Updated 5 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- C# Azure Function with an HTTP trigger that generates obfuscated PowerShell snippets that break or disable AMSI for the current process.☆431Feb 16, 2026Updated 2 weeks ago
- NimReflectiveLoader is a Nim-based tool for in-memory DLL execution using Reflective DLL Loading.☆31Jan 21, 2024Updated 2 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalities☆47Oct 2, 2023Updated 2 years ago
- WRecon is an open source no intussive web scanner. It is designed to discover all URL in a website recursively, without using bruteforce …☆19Oct 23, 2020Updated 5 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Downloads, decode, decrypt and executes a VBScript using cmd and mshta☆19Jun 26, 2020Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- Penetration testing utility and antivirus assessment tool.☆315Apr 25, 2023Updated 2 years ago
- Bypass UAC elevation on Windows 8 (build 9600) & above.☆58Feb 2, 2026Updated last month
- PHP ransomware that encrypts your files, as well as file and directory names.☆113Apr 25, 2023Updated 2 years ago
- Simple obfuscation tool☆544Apr 22, 2024Updated last year
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago