Yet another cross compiling reverse/bind payload generator written in Go.
☆12Sep 22, 2021Updated 4 years ago
Alternatives and similar repositories for dropper2
Users that are interested in dropper2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Yet another obfuscated payload generator written in Rust!☆13Feb 9, 2023Updated 3 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆18Jul 20, 2019Updated 6 years ago
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆35Jan 12, 2026Updated 2 months ago
- XXE Injection Payloads☆28Jul 30, 2019Updated 6 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- An0n 3xPloiTeR Shell☆35Oct 4, 2019Updated 6 years ago
- A simple reverse shell in Nim langauge. It should bypass AV-s (don't submit binaries)☆16Oct 10, 2019Updated 6 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- ☆26Sep 2, 2025Updated 6 months ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated last month
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Sep 8, 2025Updated 6 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆13May 10, 2020Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- gui uac bypass (netplwiz.exe)☆66Sep 2, 2019Updated 6 years ago
- IronPE is a Windows PE manual loader written in Rust for both x86 and x64 PE files.☆91Mar 10, 2026Updated 2 weeks ago
- I created the python script to bypass UAC to get system shell .☆121Sep 2, 2019Updated 6 years ago
- .NET Project for performing Authenticated Remote Execution☆12Nov 22, 2023Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- This is a Terminal Custom Color Pallet based off the colors used from Defcon27☆14Jul 23, 2020Updated 5 years ago
- An expressive interface for ANSI colored strings and terminal output.☆39Apr 1, 2011Updated 14 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- Burp suite Certificate modification tool☆18Apr 23, 2023Updated 2 years ago
- with metasploit☆63Apr 19, 2020Updated 5 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆20Aug 6, 2018Updated 7 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆14Oct 11, 2021Updated 4 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ☆26Nov 25, 2025Updated 4 months ago
- Malduino compatible USB rubber ducky payloads☆14Jun 7, 2019Updated 6 years ago
- 👾 WHT allow you to disable Windows Defender, Windows Firewall, clear all logs and reverse (Enable Firewall, enable Defender)☆24Aug 27, 2019Updated 6 years ago
- Stargate simulator with DHD and Whormhole☆12May 22, 2019Updated 6 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- SpooKey is a keylogger written in C++ that uses kernel-level APIs to capture keystrokes (Linux only. Windows is a work in progress)☆31Feb 12, 2020Updated 6 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago