fully Undetectable payload generator for metasploit
☆11Feb 1, 2023Updated 3 years ago
Alternatives and similar repositories for PyFUD
Users that are interested in PyFUD are comparing it to the libraries listed below
Sorting:
- ☆11Feb 14, 2023Updated 3 years ago
- Hack any account sending fake nitro QR code (only for educational purpose)☆16Jan 7, 2022Updated 4 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- This is a simple Powershell script that can be used to install a windows .MSI file(Software) without going through selecting and pressing…☆13Jul 5, 2019Updated 6 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- Advanced pishing tool with 30+ templates☆15May 1, 2022Updated 3 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Integration for ATS2000IP alarm system☆13May 17, 2023Updated 2 years ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Persistent backdoor access to all Android Devices☆54Jun 25, 2020Updated 5 years ago
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- Search an entire directory of .eml email files for a word or phrase... in over 100 languages.☆12Feb 28, 2023Updated 3 years ago
- Adapter for Lupusec alarm system☆14Feb 11, 2026Updated 2 weeks ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- It is a simple shell script that brute force Android Lock screen (When USB DEBUGGING is enable) its uses ADB tools FOR BruteForce TO use …☆12Jan 11, 2024Updated 2 years ago
- A tool to accept digital cash at your online business.☆15Nov 21, 2022Updated 3 years ago
- A collection of lists that contain random stuff☆17Dec 17, 2016Updated 9 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- 一个窃取谷歌浏览器保存的密码的示例程序,不会被杀毒软件识别,提示大家对数据安全的注意!(A sample program that steals passwords saved in Google Chrome without being detected by antiv…☆10Jul 20, 2023Updated 2 years ago
- Anonymous mail server for Termux☆14Apr 23, 2022Updated 3 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Only screensoots now, fully work editor soon☆16Feb 2, 2024Updated 2 years ago
- Life OpSec Guide on how to stay more anonymous, private, and secure in life. Take greater procatuations, and quit being tracked and mass …☆13Oct 20, 2022Updated 3 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 2 months ago
- Inexpensive, reliable, dynamic DNS over IRC☆15Jun 29, 2021Updated 4 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- A windows kernel-mode rootkit with remote control☆12Sep 17, 2022Updated 3 years ago
- This tool helps to create a unique wordlist which can crack more than 50% of passwords using brute-force attack, so on social media sites…☆55May 2, 2025Updated 9 months ago