Spearphishing tools, generate masqueraded pocket executable
☆106May 11, 2023Updated 2 years ago
Alternatives and similar repositories for masquerade
Users that are interested in masquerade are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆18Sep 11, 2023Updated 2 years ago
- A BOF to create a scheduled task using a COM object.☆16Dec 3, 2024Updated last year
- Get information from RedLine logs☆13Jan 17, 2022Updated 4 years ago
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆40Feb 12, 2023Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆57Sep 19, 2023Updated 2 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- provides pidfd support on linux 5.6+☆16Apr 2, 2021Updated 5 years ago
- CrackCaptcahLogin☆16Nov 22, 2017Updated 8 years ago
- PDF dropper Red Team Scenairos☆231Jul 31, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- avitor clone indiano☆36Mar 12, 2024Updated 2 years ago
- The new generation of famous WSO web shell. With perks included☆46Mar 9, 2026Updated last month
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆38Oct 7, 2025Updated 6 months ago
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder☆278Aug 1, 2022Updated 3 years ago
- ☆35Aug 5, 2025Updated 8 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆121Jan 23, 2026Updated 2 months ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- Anti-De4dot safeguards .NET binaries from De4dot decompiler, protecting intellectual property from unauthorized access.☆35Nov 12, 2024Updated last year
- basic script pulling ome.tv stranger ip, location and sending it to discord webhook☆13Aug 10, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆11Apr 5, 2023Updated 3 years ago
- ♦️ Python package with various features! (and rizz) ♦️☆28Jan 18, 2026Updated 3 months ago
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Apr 13, 2023Updated 3 years ago
- Official leak of source code titan stealer (whole). Includes server + client parts and admin panel. Written in C# (.NET) with library au…☆20Aug 10, 2023Updated 2 years ago
- ☆124Oct 9, 2023Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆107Jul 31, 2023Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Jan 12, 2023Updated 3 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆63Apr 10, 2024Updated 2 years ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- 基于Java jxbrowser 浏览器的登录枚举测试工具 (支持验证码识别)☆13Jul 10, 2025Updated 9 months ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- Registry hive parsing the async way☆25Oct 29, 2025Updated 5 months ago
- Kali Linux Customization and Setup Tool for Newly Imported VM's☆39Feb 3, 2026Updated 2 months ago
- Работа с логами Echelon, RedLine, Racoon, DCRat etc☆83Jun 29, 2023Updated 2 years ago
- ☆17May 5, 2022Updated 3 years ago