malwarekid / Fileless-PE
Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionality to specify a method to execute if the file is a DLL. The script utilizes the pythonmemorymodule library for memory manipulation.
☆23Updated 8 months ago
Alternatives and similar repositories for Fileless-PE:
Users that are interested in Fileless-PE are comparing it to the libraries listed below
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- An open-source .NET Ransomware☆24Updated 3 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- Social Engineering Browser Update Attack.☆56Updated last year
- A Fully Undectable RAT for Windows that bypass every kind of Antivirus Protections and will give u a CMD shell in your terminal☆47Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- LNK-Dropper Builder☆21Updated 6 months ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆35Updated last year
- HID payloads for good purpose☆9Updated 3 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆16Updated 2 years ago
- Simple Tool for webhacking☆11Updated last year
- Fsociety RAT, The Open Source C++ Remote Administration Tool (RAT)☆33Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 10 months ago
- Automate Blind SQL Injection with Python.☆21Updated 2 years ago
- ⚡ Create infinate UAC prompts forcing a user to run as admin ⚡☆12Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 7 months ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆24Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆11Updated last year
- B-UAC, Windows UAC Bypass Trojan Generator☆8Updated 6 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- Pentesting Tools to Automatize Active Directory Hacking☆18Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆40Updated 2 years ago
- A simple script to obfuscate batch(bat) code easily☆22Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago