ice-wzl / bash-malware-dropperLinks
Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells and persistence techniques, can be set to run via user interaction or coupled with a bot.
☆18Updated last year
Alternatives and similar repositories for bash-malware-dropper
Users that are interested in bash-malware-dropper are comparing it to the libraries listed below
Sorting:
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆18Updated 2 years ago
- Disable Windows Defender All Version☆31Updated 4 years ago
- Multithread reverse shell listener☆25Updated last year
- ☆25Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆21Updated 2 months ago
- Enumeration & fingerprint tool☆24Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆30Updated 7 months ago
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated last year
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆76Updated last year
- A powerful reverse shell generator☆44Updated 3 years ago
- Python TCP server for terminal rickrolls☆12Updated 3 years ago
- ☆12Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Automate Blind SQL Injection with Python.☆23Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Kusanagi is a bind and reverse shell payload generator with obfuscation and badchar support.☆22Updated 4 years ago
- Google Chrome Cookies Stealer. Steals Chrome cookies☆44Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- This tool extracts Credit card numbers, NTLM(DCE-RPC, HTTP, SQL, LDAP, etc), Kerberos (AS-REQ Pre-Auth etype 23), HTTP Basic, SNMP, POP, …☆19Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 2 years ago
- service location protocol amplified denial of service attack verification tool☆16Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago