fully Undetectable payload generator for metasploit
☆11Feb 1, 2023Updated 3 years ago
Alternatives and similar repositories for PyFUD
Users that are interested in PyFUD are comparing it to the libraries listed below
Sorting:
- Hack any account sending fake nitro QR code (only for educational purpose)☆17Jan 7, 2022Updated 4 years ago
- Advanced pishing tool with 30+ templates☆16May 1, 2022Updated 3 years ago
- My latest Airbnb clone with a gorgeous UI☆13May 1, 2021Updated 4 years ago
- A tool to accept digital cash at your online business.☆15Nov 21, 2022Updated 3 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Convert Any Exe to Bin (Base64 Output or Binary)☆21Jun 19, 2020Updated 5 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Telegram marketing client, built in Python using Telethon framework.☆14May 23, 2021Updated 4 years ago
- A powerful token/cookie grabber, creates a fully undetectable cookie/token logger within seconds, undetected by any AV as well.☆20Aug 1, 2022Updated 3 years ago
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆79Oct 21, 2023Updated 2 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- ☆11Dec 8, 2023Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆32Oct 21, 2023Updated 2 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 3 months ago
- Let's bring Tux to Ubuntu☆10Feb 16, 2022Updated 4 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 8 months ago
- 100% Undetectable NodeJS reverse shell backdoor that autoruns on startup.☆24Feb 25, 2022Updated 4 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- simple encrypted zfs ubuntu installer☆27Dec 1, 2023Updated 2 years ago
- Simple but sharp ransomware☆35Jul 11, 2020Updated 5 years ago
- Only screensoots now, fully work editor soon☆16Feb 2, 2024Updated 2 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- Inexpensive, reliable, dynamic DNS over IRC☆15Jun 29, 2021Updated 4 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- 一个窃取谷歌浏览器保存的密码的示例程序,不会被杀毒软件识别,提示大家对数据安全的注意!(A sample program that steals passwords saved in Google Chrome without being detected by antiv…☆10Jul 20, 2023Updated 2 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- ATM Configurator aka Tyupkin trojan☆12Mar 23, 2015Updated 10 years ago
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- ☆28Nov 14, 2022Updated 3 years ago
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago