malwarekid / VBS-Stager
Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides an option to add persistence for automatic execution on system startup.
☆11Updated 8 months ago
Alternatives and similar repositories for VBS-Stager:
Users that are interested in VBS-Stager are comparing it to the libraries listed below
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated 8 months ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero an…☆29Updated last year
- Whspdefendor Exploit Framework v1.0☆13Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆23Updated 2 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆10Updated 8 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆44Updated last year
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- ☆24Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆11Updated last month
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 5 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- MacroExploit use in excel sheet☆20Updated last year
- LNK-Dropper Builder☆18Updated 4 months ago
- CVE-2023-38389 < Wordpress < JupiterX Core < Unauthenticated Account Takeover☆27Updated 6 months ago
- Social Engineering Browser Update Attack.☆56Updated last year
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 8 months ago
- PDump is a project for dumping leaked credentials from DEHASHED☆15Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆15Updated 5 months ago
- Simple Tool for webhacking☆10Updated last year
- Cobalt Strike BOFS☆16Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆12Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆19Updated 6 months ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 9 months ago
- ☆14Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago