loseys / BlackMambaLinks
C2/post-exploitation framework
☆1,081Updated 3 years ago
Alternatives and similar repositories for BlackMamba
Users that are interested in BlackMamba are comparing it to the libraries listed below
Sorting:
- ParadoxiaRat : Native Windows Remote access Tool.☆805Updated 2 years ago
- Python AV Evasion Tools☆515Updated 5 months ago
- Tool for especially scanning nearby devices and execute a given command on its own system while the target device comes in range.☆366Updated 3 years ago
- ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication☆1,002Updated 2 years ago
- A Python based RAT 🐀 (Remote Access Trojan) for getting reverse shell 🖥️☆812Updated last year
- C2 Powershell Command & Control Framework with BuiltIn Commands☆497Updated last year
- Open source C2 server created for stealth red team operations☆818Updated 2 years ago
- RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model,…☆284Updated 4 years ago
- Hide your payload into .jpg file☆394Updated 3 years ago
- PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.☆330Updated 7 months ago
- A simple python packer to easily bypass Windows Defender☆639Updated 3 years ago
- Ransom0 is a open source ransomware made with Python, designed to find and encrypt user data.☆352Updated 2 weeks ago
- This project is a cross-platform backdoor/reverse shell and post-exploitation tool written in Python3☆731Updated 10 months ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆982Updated last year
- Penetration testing utility and antivirus assessment tool.☆315Updated 2 years ago
- Fake Windows logon screen to steal passwords☆1,354Updated 5 years ago
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,122Updated 2 months ago
- Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.☆1,510Updated 3 years ago
- ☆1,466Updated last year
- Automated brute-forcing attack tool.☆407Updated 4 years ago
- SniperPhish - The Web-Email Spear Phishing Toolkit☆588Updated last month
- fully automated pentesting tool☆512Updated 2 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆843Updated 2 years ago
- A backdoor with a multitude of features.☆285Updated 8 months ago
- c++ fully undetected shellcode launcher ;)☆977Updated 4 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,182Updated 2 years ago
- mip22 is a advanced phishing tool☆627Updated 10 months ago
- Python steal chrome password all version browser are supported 100 % FUD☆285Updated 4 years ago
- Python Tool that gives you the ability to run Advanced Google Queries (Known as Google Dorks - Google Dorking)☆1,180Updated last year
- RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware☆964Updated 4 years ago