Mutation Of Vıruses
☆49Dec 10, 2015Updated 10 years ago
Alternatives and similar repositories for Shellsploit
Users that are interested in Shellsploit are comparing it to the libraries listed below
Sorting:
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Feb 9, 2016Updated 10 years ago
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- KINS Banking Trojan☆65Feb 25, 2015Updated 11 years ago
- ☆10Dec 28, 2015Updated 10 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- D-RAT SRC Extract☆13Dec 24, 2016Updated 9 years ago
- Shellcode Loader Engine for Windows☆27Jan 29, 2017Updated 9 years ago
- Scripts and tools for ISM hacking☆16Mar 25, 2018Updated 7 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- ☆11Jul 26, 2017Updated 8 years ago
- github信息泄露搜集工具。GSIL升级版,去除发邮件方式,将结果保存在本地☆13Mar 20, 2021Updated 5 years ago
- Assembly API block that uses CRC32 for resolving Windows API function addresses☆18May 19, 2023Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- Scapy tools and scripts☆20Jun 19, 2020Updated 5 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Native Development Kit for Vista 64bit And Later, by me, Based on NDK Headers 1.0, by Alex Ionescu☆17Dec 6, 2015Updated 10 years ago
- Iris is an adjudicational Trojan & a fullon userland RAT, Targeting windows machine's, maid for Research purposes And as a resource Kit f…☆30Dec 14, 2018Updated 7 years ago
- 暴力检测一些qq企业邮箱弱口令的用户。以提醒他们修改密码☆13Nov 25, 2015Updated 10 years ago
- Metasploit things, modules, plugins, exploits☆26Aug 8, 2014Updated 11 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Dec 9, 2015Updated 10 years ago
- Dangerous Malwares☆216Dec 10, 2016Updated 9 years ago
- 一些Win32或MFC常用的工具类☆14Jan 20, 2014Updated 12 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆26Dec 14, 2016Updated 9 years ago
- Bootkits☆19Sep 13, 2023Updated 2 years ago
- Malware exploits☆554Aug 22, 2025Updated 6 months ago
- Hook IDT vector 0xb2 to detect SCI in 64bit windows.☆34Aug 27, 2022Updated 3 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- DNS反弹shell客户端☆13Jul 24, 2016Updated 9 years ago
- A collection of Yara rules I have created so far☆16Oct 26, 2020Updated 5 years ago
- Install beef-xss from github☆18Jul 10, 2017Updated 8 years ago
- Access windows machine remotely on HTTP☆12Oct 28, 2020Updated 5 years ago
- Educational repository for learning about rootkits and Windows Kernel Hooks.☆48Mar 21, 2015Updated 10 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- RIG Exploit Kit (front end)☆30Feb 25, 2015Updated 11 years ago