i-am-unbekannt / unbekannt-frameworkLinks
A Hacking and Pentesting Tool for Windows
☆20Updated last month
Alternatives and similar repositories for unbekannt-framework
Users that are interested in unbekannt-framework are comparing it to the libraries listed below
Sorting:
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated 2 years ago
- Windows Hacking FrameWork using Reverse Shell☆108Updated 5 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆40Updated 3 years ago
- Ded Security Framework is a tool aimed at security professionals☆36Updated last year
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated last year
- Repository of tools used in my blog☆51Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆53Updated 2 years ago
- A powerful and flexible tool to apply active attacks for disrupting stegomalware☆54Updated 3 years ago
- A tool designed to analyse email headers☆37Updated 2 years ago
- An open-source .NET Ransomware☆26Updated 4 years ago
- Arkhota, a web brute forcer for Android.☆18Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆31Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆32Updated 3 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆21Updated 11 months ago
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 3 years ago
- This will encrypt 🤐 your files using AES-256-CTR, then RSA-4096😵💫to secure the exchange with the server, or can use the Tor SOCKS5 Pr…☆78Updated last year
- Extendable Python script handler for automating penetration testing.☆40Updated 2 years ago
- Anubis 7.0☆27Updated 11 months ago
- An ADB-based botnet written in C.☆44Updated 3 years ago
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Collection Of LolSec☆37Updated 6 years ago
- Full Valid Fake Data Generator☆100Updated 11 months ago
- Simple program to steal private files from removable storages☆88Updated 3 years ago