hrtywhy / HanomanLinks
Hanoman is an GUI antivirus engine sigature based detection π
β49Updated 3 years ago
Alternatives and similar repositories for Hanoman
Users that are interested in Hanoman are comparing it to the libraries listed below
Sorting:
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.β51Updated 4 years ago
- A proof-of-concept Node.js ransomwareβ21Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year
- Well, I have created this shit for educational pruposes (I think)β36Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β41Updated 4 years ago
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executabβ¦β45Updated 3 years ago
- Disable Windows Defender All Versionβ32Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHPβ25Updated 3 years ago
- β28Updated 4 years ago
- A wacky exploitation framework written in pure python3.β25Updated last year
- Inject Metasploit Shell Code in Legitimate Processβ11Updated 4 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.β98Updated 4 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.β40Updated 4 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.β39Updated 9 months ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ19Updated 5 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementationβ20Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- Reverse shell using Windows Registry files (.reg)β17Updated 5 years ago
- Alleged source code leak of Osiris banking trojanβ37Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one toβ¦β60Updated 4 years ago
- Collaborative malware exchange repository.β35Updated 8 months ago
- π Help find Trojan Source vulnerability in code π . Useful for code review in project with multiple collaborators (CI/CD)β48Updated last year
- π Reverse shell written on python3β15Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ18Updated 4 years ago
- recover Firefox and more browsers loginsβ50Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- Antiscan.me automatization scriptβ30Updated last year
- Python Reverse Shell Builder with some advanced functionalitiesβ12Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β34Updated 6 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Updated 4 years ago