Spearphishing tools, generate masqueraded pocket executable
☆107May 11, 2023Updated 2 years ago
Alternatives and similar repositories for masquerade
Users that are interested in masquerade are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malicious shortcut file builder for spear-phishing and red-team engagement.☆17Sep 11, 2023Updated 2 years ago
- A BOF to create a scheduled task using a COM object.☆16Dec 3, 2024Updated last year
- MB Bank Balance Notifier là một ứng dụng iOS mô phỏng thông báo biến động số dư tài khoản MB Bank. Ứng dụng này giúp bạn kiểm tra và trải…☆13Jul 27, 2024Updated last year
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆40Feb 12, 2023Updated 3 years ago
- RegStrike is a .reg payload generator☆58Sep 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Jul 22, 2024Updated last year
- Shellcode loader with evasion capabilities written in Nim☆15Jan 25, 2025Updated last year
- CrackCaptcahLogin☆16Nov 22, 2017Updated 8 years ago
- Custom Python shellcode encryptor and obfuscator☆14Jul 31, 2025Updated 7 months ago
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- This exploit is utilising AddressOfEntryPoint of process which is RX and using WriteProcessMemory internal magic to change the permission…☆18Oct 31, 2024Updated last year
- The new generation of famous WSO web shell. With perks included☆45Mar 9, 2026Updated 2 weeks ago
- SMTP Heist (SMTP Cracker) - Advanced Built with PyQt6 UI - Report to Telegram☆37Oct 7, 2025Updated 5 months ago
- ☆13May 24, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A Free Silent (Hidden) Open-Source Native Binder - Includes Windows Defender Bypass - Unam Binder☆280Aug 1, 2022Updated 3 years ago
- ☆35Aug 5, 2025Updated 7 months ago
- WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a…☆120Jan 23, 2026Updated 2 months ago
- Anti-De4dot safeguards .NET binaries from De4dot decompiler, protecting intellectual property from unauthorized access.☆33Nov 12, 2024Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago
- 本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms漏洞利用工具,爆破工具、内网横向及免杀、社工钓鱼以及应急响应等资料。☆15Jun 30, 2023Updated 2 years ago
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- Cookie & Logins stealer for Firefox + Chrome, demonstration only☆11Apr 5, 2023Updated 2 years ago
- This sample shows how to uninstall and hide apps programmatically☆12Dec 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber …☆105Jul 31, 2023Updated 2 years ago
- Explorer Persistence technique : Hijacking cscapi.dll order loading path and writing our malicious dll into C:\Windows\cscapi.dll , when …☆84Jan 12, 2023Updated 3 years ago
- Remote Administration Tool, Server Written in C# and Client Written in C++☆15Dec 8, 2022Updated 3 years ago
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆63Apr 10, 2024Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆53Jan 11, 2025Updated last year
- Simple tool to log in with steam ssfn accounts.☆14Aug 25, 2023Updated 2 years ago
- 基于Java jxbrowser 浏览器的登录枚举测试工具 (支持验证码识别)☆13Jul 10, 2025Updated 8 months ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- ☆11Feb 19, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Group 4 - C# Remote Administrator Tool☆11Feb 18, 2025Updated last year
- 🦄 Fast proxy scraper & checker☆10Jan 2, 2023Updated 3 years ago
- Работа с логами Echelon, RedLine, Racoon, DCRat etc☆82Jun 29, 2023Updated 2 years ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆31Jul 11, 2025Updated 8 months ago
- A tool for uploading/downloading files anonymously with client-side encryption☆15Dec 1, 2025Updated 3 months ago
- ☆21Jun 10, 2025Updated 9 months ago
- Defeating Anti-Debugging Techniques for Malware Analysis☆12Oct 1, 2022Updated 3 years ago