hexsecteam / CVE-2025-8088-Winrar-ToolLinks
☆18Updated 4 months ago
Alternatives and similar repositories for CVE-2025-8088-Winrar-Tool
Users that are interested in CVE-2025-8088-Winrar-Tool are comparing it to the libraries listed below
Sorting:
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆190Updated 7 months ago
- This Discord Rat give you the best way to control victims pc on discord.☆21Updated 5 months ago
- ☆69Updated 2 years ago
- Drana-Infinity is a locally hosted advanced AI assistant designed and developed by IHA089. It’s built specifically for cybersecurity, eth…☆152Updated last month
- A Sophisticated, Automated, AI-Driven, State-Sponsored Cyber-Espionage/Counter-Espionage & Zero Click AI-Gen Supply Chain Attack Framewor…☆64Updated 8 months ago
- reverse shell, Bypass windows defender firewall☆45Updated last year
- Open-source URL masking & analysis tool for security research, phishing awareness, and defensive testing. Demonstrates adversary techniqu…☆467Updated 2 weeks ago
- A social engineering toolkit for performing smishing, and other sms attacks☆106Updated last year
- The best WiFi spy avalaible for hire! Made for hackers, for hackers☆233Updated 6 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆64Updated last year
- AdminPBuster identifies hidden admin panels for any domain using a built-in wordlist that includes both common and obscure paths, effecti…☆47Updated 8 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆209Updated 9 months ago
- Thief Raccoon is a tool designed for educational purposes to demonstrate how phishing attacks can be conducted on various operating syste…☆177Updated last year
- SilverInstaEye is a comprehensive OSINT tool for Instagram. It gathers extensive information about the target user.☆250Updated 8 months ago
- control windows computeur from telegram☆67Updated 2 years ago
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆186Updated last year
- [BLTools] Best Logs Cookies Checker by boyring☆44Updated 3 years ago
- Net Strike is a powerful multi-protocol DDoS tool written in Python. It uses IP spoofing for anonymity and maximizes attack speed with mu…☆76Updated 7 months ago
- KeyloggerScreenshot is an intelligent tool which logs keys, makes a Screenshot every 20 seconds, recordes the mouse click with x and y po…☆129Updated 2 months ago
- Embed malware, apks, executables or any other binary file into a PDF, or generate a PDF with malicious link encrusted.☆106Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆69Updated 4 years ago
- ☆31Updated last year
- This tool will generate a virus that can only destroy Windows computer. You can also configure to auto run in usb drive☆285Updated 11 months ago
- A GUI based program for making customised crypto stealing malware written in python☆46Updated 3 months ago
- Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will f…☆116Updated 4 months ago
- WifiHackBar - A powerful WiFi Hacking Tool. Scan networks, perform deauthentication attacks, and create fake APs with an easy web interfa…☆44Updated 7 months ago
- It is an automated phishing tool that includes more than 30 phishing templates.☆98Updated last year
- A tool for automatically change the Tor IP address over time.☆124Updated 9 months ago
- Advance OTP Bypass Tool. Termux Supported.☆107Updated 11 months ago
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆40Updated last year