laudarch / ShellsploitLinks
Mutation Of Vıruses
☆49Updated 9 years ago
Alternatives and similar repositories for Shellsploit
Users that are interested in Shellsploit are comparing it to the libraries listed below
Sorting:
- Simple Remote Access Trojan☆23Updated 8 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆50Updated 6 years ago
- Remote Windows shell☆32Updated 11 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Updated 9 years ago
- D-RAT SRC Extract☆12Updated 8 years ago
- The Metasploit GUI☆90Updated 8 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- Mass malicious script dump/Malware src dump☆57Updated 8 years ago
- Social Engineering Toys☆36Updated 9 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆60Updated 7 years ago
- Converts a command to a base64 powershell compatible string☆27Updated 11 years ago
- Darknet botnet/worm aims to be a distributed anonymous P2P-based simple botnet written in Assembly☆36Updated 12 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆59Updated 2 years ago
- ZeroRemote Trojan SRC Extract☆19Updated 8 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Virus RAT v8.0 Beta☆24Updated 8 years ago
- Malware Samples. Uploaded to GitHub for those want to analyse the code.☆34Updated 8 years ago
- FUZZBUNCH - NSA security tools☆76Updated 8 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 8 months ago
- Alina Spark - Point of Sales Trojan☆48Updated 10 years ago
- Plog - A simple and powerful keylogger !☆11Updated 7 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 8 years ago