Spoof file icons and extensions in Windows
☆190Feb 6, 2026Updated last month
Alternatives and similar repositories for ExtensionSpoofer
Users that are interested in ExtensionSpoofer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple extension spoofer that will change your dangerous file (not only) into something like "Presentation-for_schoolexe.pptx", "exeexeex…☆17Jan 23, 2022Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- Icon Changer, File Pumper & Extension Spoofer - Quickly Modify Executable Files☆66Feb 11, 2018Updated 8 years ago
- ☆25Mar 21, 2020Updated 6 years ago
- Scan suspicious applications with over 60 different anti-viruses with a mere two clicks and five seconds!☆40Feb 24, 2023Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- NoSecerets is a python script that is designed to crack hashes extremely fast. Faster even than Hashcat☆11Mar 13, 2022Updated 4 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder☆280Aug 1, 2022Updated 3 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- spoof an extension of any file by using U+202E Unicode character☆15Nov 5, 2021Updated 4 years ago
- File Write Weapon for Privilege Escalation To get SYSTEM☆18May 29, 2020Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Dec 6, 2020Updated 5 years ago
- Phishing Reverse Proxy with MFA bypass☆17Jan 28, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A Tool For Crypt File And Bypass AntiVirus Even msfvenom Payloads☆20Sep 6, 2019Updated 6 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by brutefor…☆353Apr 20, 2022Updated 3 years ago
- This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)☆77Oct 1, 2020Updated 5 years ago
- C++ Script to Create "Obfuscated Native ShellCode Launcher" #Obfuscator #Shellcode #Generator☆13Apr 3, 2021Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Simple program to stream offsets for your game cheat, Was reversing some p2c and decided to recreate a better version of this function fo…☆11Sep 12, 2022Updated 3 years ago
- PHP ransomware that encrypts your files, as well as file and directory names.☆113Apr 25, 2023Updated 2 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Sep 29, 2021Updated 4 years ago
- Basic Windows 32-bit debugger with special functions like directory monitoring and DLL injection☆14Mar 7, 2019Updated 7 years ago
- Python Obfuscator to generate One-Liners and FUD Payloads.☆163Jul 11, 2021Updated 4 years ago
- Penetration testing utility and antivirus assessment tool.☆314Apr 25, 2023Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆94May 15, 2021Updated 4 years ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- ☆21Oct 3, 2019Updated 6 years ago
- A PowerShell script anti-virus evasion tool☆1,174Mar 19, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.☆15Apr 13, 2023Updated 2 years ago
- AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalities☆47Oct 2, 2023Updated 2 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆41Jan 2, 2018Updated 8 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago