infoskirmish / BadRabbit
☆9Updated 6 years ago
Related projects: ⓘ
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆48Updated 7 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆21Updated 6 years ago
- DarkComet☆13Updated last year
- An advanced command-line search engine for Exploit-DB☆16Updated 2 years ago
- ☆17Updated this week
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- Modern problems require modern solutions☆31Updated last year
- Backdoor en powershell vía Telegram☆29Updated 7 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆27Updated 3 years ago
- ObscurityLabs RedTeam C# Toolkit☆119Updated 5 years ago
- Automated Tools Pentest☆5Updated last year
- ☆19Updated this week
- SMBMap is a handy SMB enumeration tool☆35Updated 3 months ago
- ☆78Updated this week
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆96Updated 6 years ago
- The source code of the Zeus Evolution botnet that used TOR.☆54Updated 7 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆10Updated 5 years ago
- sshd-poison is a tool that modifies a sshd binary to capture password-based authentications and allows you to login in some accounts usin…☆92Updated 3 years ago
- ☆58Updated this week
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆84Updated 5 years ago
- mosquito - Automating reconnaissance and brute force attacks☆124Updated 4 years ago
- Windows UAC Bypass☆96Updated 5 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 6 months ago
- ☆18Updated this week
- A collection of data exfiltration scripts for Red Team assessments.☆91Updated 4 years ago
- Javascript Botnet☆22Updated 6 years ago
- Web-based Source Code Vulnerability Scanner☆19Updated 8 years ago
- Search drives for documents containing passwords☆61Updated 10 years ago
- Penetration Test / Read Team - C# tools repository☆56Updated 2 years ago