laudarch / Shellsploit
Mutation Of Vıruses
☆51Updated 9 years ago
Alternatives and similar repositories for Shellsploit:
Users that are interested in Shellsploit are comparing it to the libraries listed below
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- A simple Android Remote Administration Tool written for https://0x00sec.org!☆36Updated 8 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- Dendroid HTTP RAT Original☆69Updated 8 years ago
- Virus RAT v8.0 Beta☆23Updated 8 years ago
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22Updated 7 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- ☆19Updated 7 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- Nj RAT Stub☆15Updated 8 years ago
- Post-Exploitation Framework☆76Updated 8 years ago
- Shutdown 2017 Malware (Worm - Ransomware - Rogue Security Software) - Includes AHXR-ScreenLock (Screen Lock Builder - Kills Task Manager…☆59Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Updated 10 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆28Updated 3 years ago
- D-RAT SRC Extract☆12Updated 8 years ago
- ssh session type for metasploit☆99Updated 2 years ago
- Better Remote Access Trojan☆49Updated 8 years ago
- PoC Android smart phone botnet☆78Updated 12 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Updated 8 years ago
- Random stuff☆16Updated 6 years ago
- Autosploit = Automating Metasploit Modules.☆76Updated 5 years ago
- some python3 functions to add spreading features to any python backdoor☆53Updated 8 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Updated 6 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- iSpy Keylogger☆42Updated 8 years ago
- Red Login: SSH Brute-force Tools☆103Updated 6 years ago