jm33-m0 / mec
for mass exploiting
☆598Updated 2 years ago
Alternatives and similar repositories for mec:
Users that are interested in mec are comparing it to the libraries listed below
- transform your payload.exe into one fake word doc (.ppt)☆462Updated 5 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆326Updated 5 months ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆435Updated 7 years ago
- Advanced reconnaissance utility☆964Updated last year
- IP obfuscator made to make a malicious ip a bit cuter☆542Updated 3 months ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆717Updated 2 years ago
- MSFvenom Payload Creator (MSFPC)☆1,239Updated 3 years ago
- metasploitHelper☆245Updated 4 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948Updated 5 years ago
- SQL Injection Exploitation Tool☆734Updated 6 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆598Updated 3 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Updated 7 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,400Updated 6 years ago
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆235Updated 3 years ago
- Cloak can backdoor any python script with some tricks.☆487Updated 5 years ago
- Auto Scanning to SSL Vulnerability☆629Updated 4 years ago
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,687Updated 3 months ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆434Updated 5 years ago
- Script to steal passwords from ssh.☆478Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆560Updated last year
- network reconnaissance toolkit☆420Updated 6 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,104Updated 7 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆494Updated 5 years ago
- discontinued☆518Updated last year
- Tools, scripts and tips useful during Penetration Testing engagements.☆616Updated this week
- Damn Small SQLi Scanner☆831Updated 3 weeks ago
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆902Updated 5 years ago
- Undetectable Windows Payload Generation☆1,568Updated 2 years ago