luis22d / ZTrace11-Welcome-FutureLinks
ZTrace 11 is Continuation of the zerotrace.
☆23Updated 3 months ago
Alternatives and similar repositories for ZTrace11-Welcome-Future
Users that are interested in ZTrace11-Welcome-Future are comparing it to the libraries listed below
Sorting:
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 5 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆138Updated 8 months ago
- Linux-based botnet builder designed for creating advanced botnet payloads.☆100Updated 3 months ago
- Laravel RCE Exploitation Toolkit☆22Updated 2 weeks ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆105Updated last week
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆184Updated last year
- specialized investigative framework to investigate cases of malicious actors in the OSINT and backup dark forums.☆60Updated last month
- 🙊 Advanced Rat controllable by a telegram bot with many commands and functions.☆16Updated last year
- Infiltrax is a post-exploitation reconnaissance tool for penetration testers and red teams, designed to capture screenshots, retrieve cli…☆79Updated last year
- A meticulously curated collection of exploitation tools for the discerning security professional. When precision meets power, and stealt…☆30Updated 4 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆121Updated 4 months ago
- Telegram video (mp4) extension manipulation PoC☆95Updated 6 months ago
- ☆65Updated last year
- PDF dropper Red Team Scenairos☆221Updated last year
- POC | Steal user WhatsApp information/data☆73Updated 4 months ago
- Here are +200 different rats some with source code☆117Updated last year
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆416Updated last month
- A fast Go-based tool to uncover sensitive information in JavaScript☆34Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆79Updated 3 weeks ago
- Keklick - C2 Hunting, Reporting and Visualization Tool☆62Updated last month
- Admin Directory Finder is a tool designed to scan and identify directories under admin paths, such as admin/dashboard.php. It helps in se…☆30Updated 2 weeks ago
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- Curated collection of cybersecurity tools featured in Black Hat Arsenal events.☆55Updated last month
- PEGASUS-NEO is a comprehensive penetration testing framework designed for security professionals and ethical hackers. It combines multipl…☆64Updated 6 months ago
- A comprehensive web application security testing toolkit that combines 10 powerful penetration testing features into one tool.☆36Updated 4 months ago
- Polymorphic Command & Control☆92Updated 6 months ago
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- PacketSpy☆157Updated last year
- Africana Framework is an open-source, community-driven cybersecurity toolkit designed for ethical penetration testing & vulnerability ass…☆40Updated this week