Mutation Of Vıruses
☆49Dec 10, 2015Updated 10 years ago
Alternatives and similar repositories for Shellsploit
Users that are interested in Shellsploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 8 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Wireless magnetic card emulation☆14Sep 21, 2019Updated 6 years ago
- ☆11Jul 26, 2017Updated 8 years ago
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 5 years ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Dec 6, 2015Updated 10 years ago
- transparent TCP-to-proxy redirector☆16Dec 8, 2019Updated 6 years ago
- 暴力检测一些qq企业邮箱弱口令的用户。以提醒他们修改密码☆13Nov 25, 2015Updated 10 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- Dangerous Malwares☆216Dec 10, 2016Updated 9 years ago
- 一些Win32或MFC常用的工具类☆14Jan 20, 2014Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆26Dec 14, 2016Updated 9 years ago
- Bootkits☆19Sep 13, 2023Updated 2 years ago
- Malware exploits☆559Aug 22, 2025Updated 7 months ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- Install beef-xss from github☆18Jul 10, 2017Updated 8 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆48Mar 21, 2015Updated 11 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- RIG Exploit Kit (front end)☆31Feb 25, 2015Updated 11 years ago