laudarch / Shellsploit
Mutation Of Vıruses
☆50Updated 9 years ago
Alternatives and similar repositories for Shellsploit:
Users that are interested in Shellsploit are comparing it to the libraries listed below
- Simple Remote Access Trojan☆21Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Dendroid HTTP RAT Original☆68Updated 8 years ago
- Better Remote Access Trojan☆48Updated 8 years ago
- Virus RAT v8.0 Beta☆21Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android) Remote Administration Tool with an embedded Python interpreter.☆15Updated 9 years ago
- Autosploit = Automating Metasploit Modules.☆76Updated 5 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆35Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆35Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆19Updated 9 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆59Updated 7 years ago
- ☆19Updated 7 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- Nj RAT Stub☆15Updated 8 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 8 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 7 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- Post-Exploitation Framework☆75Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆35Updated 11 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Trying to be the best tool to search for exploits in the terminal.☆19Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Updated 6 years ago