Spearphishing tools, generate masqueraded pocket executable
☆107May 11, 2023Updated 3 years ago
Alternatives and similar repositories for masquerade
Users that are interested in masquerade are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool to parse Stealer Logs.☆20Aug 2, 2023Updated 2 years ago
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆18Sep 11, 2023Updated 2 years ago
- A BOF to create a scheduled task using a COM object.☆18Dec 3, 2024Updated last year
- Get information from RedLine logs☆13Jan 17, 2022Updated 4 years ago
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆38Feb 12, 2023Updated 3 years ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆33Aug 16, 2023Updated 2 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Credentials recovery project☆17Mar 13, 2019Updated 7 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Shellcode loader with evasion capabilities written in Nim☆16Jan 25, 2025Updated last year
- CrackCaptcahLogin☆16Nov 22, 2017Updated 8 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 9 months ago
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆38Oct 7, 2025Updated 7 months ago
- ☆13May 24, 2023Updated 2 years ago
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder☆279Aug 1, 2022Updated 3 years ago
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- AiGPT started from the concept of CVE‑2024‑27956 , the WP Automatic CSV injection — but has been completely rebuilt into a multi‑vector, …☆122May 9, 2026Updated last week
- Anti-De4dot safeguards .NET binaries from De4dot decompiler, protecting intellectual property from unauthorized access.☆35Nov 12, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- ♦️ Python package with various features! (and rizz) ♦️☆27Jan 18, 2026Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- C# Data Collector for BloodHound with CobaltStrike integration (BOF.NET)☆60Apr 13, 2023Updated 3 years ago
- ☆124Oct 9, 2023Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆107Jul 31, 2023Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Jan 12, 2023Updated 3 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- ☆29May 19, 2023Updated 2 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆62Apr 10, 2024Updated 2 years ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆52Jan 11, 2025Updated last year
- 基于Java jxbrowser 浏览器的登录枚举测试工具 (支持验证码识别)☆13Jul 10, 2025Updated 10 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- Registry hive parsing the async way☆25Oct 29, 2025Updated 6 months ago
- Kali Linux Customization and Setup Tool for Newly Imported VM's☆39Feb 3, 2026Updated 3 months ago
- Работа с логами Echelon, RedLine, Racoon, DCRat etc☆83Jun 29, 2023Updated 2 years ago
- Scrape memes and generate YouTube shorts, all automatically.☆21Aug 29, 2023Updated 2 years ago