Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides an option to add persistence for automatic execution on system startup.
☆13May 19, 2024Updated last year
Alternatives and similar repositories for VBS-Stager
Users that are interested in VBS-Stager are comparing it to the libraries listed below
Sorting:
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16May 6, 2024Updated last year
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- ☆18May 11, 2021Updated 4 years ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆17Jan 24, 2024Updated 2 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆25Dec 18, 2024Updated last year
- HID payloads for good purpose☆10Dec 17, 2024Updated last year
- Mrco24-Lfi-Scanner is a high-speed Local File Inclusion (LFI) vulnerability scanning tool developed in the Go programming language. It's …☆13Dec 16, 2023Updated 2 years ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆65Jul 18, 2024Updated last year
- ☆15Dec 12, 2023Updated 2 years ago
- Powershell modules and commands that come in handy for pentests and red team assessments.☆18Oct 31, 2018Updated 7 years ago
- xsschecker tests endpoints for reflected XSS by injecting payloads and checking responses. It prints vulnerable if the payload is reflect…☆36Nov 3, 2025Updated 4 months ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- The Best DDoS Attack Tool + Bypass Cloud Flare CDN For Priv8☆19Oct 14, 2025Updated 4 months ago
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- Various AD tools needed for penetration testing in one place.☆23Jul 13, 2023Updated 2 years ago
- Updated Exploit - pfBlockerNG <= 2.1.4_26 Unauth RCE (CVE-2022-31814)☆23Jul 23, 2024Updated last year
- Python program Fileless-PE.py generates a Python script (PEloader.py) to load a DLL or EXE file from a given URL. It provides functionali…☆30Jul 17, 2024Updated last year
- A simple PDF summarizer with Node.js and groq-sdk☆11Jan 11, 2025Updated last year
- An improvement and a different approach to Mockingjay Self-Injection.☆35May 21, 2024Updated last year
- The Swiss army knife of evasion tool that bypasses AMSI, Applocker, and CLM mode simultaneously.☆27Mar 9, 2024Updated last year
- Harness the Power of AI for all your reporting needs.☆28Apr 17, 2023Updated 2 years ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- ☆11Sep 15, 2024Updated last year
- Build OpenApi specs for your APIs from Burp's traffic using Levo.ai. Also detect the PII in your APIs.☆31Feb 23, 2026Updated last week
- ☆20Aug 6, 2025Updated 6 months ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A solid recon tool I use personally.☆30May 12, 2023Updated 2 years ago
- A PoC exploit for CVE-2023-43208 - Mirth Connect Remote Code Execution (RCE)☆28Mar 16, 2024Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- ☆11Oct 14, 2020Updated 5 years ago
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- This repository is dedicated to the SOC (Security Operations Center) Analyst course. It contains all the necessary resources, notes, scri…☆16Aug 31, 2024Updated last year
- ☆29May 29, 2025Updated 9 months ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Config files for my GitHub profile.☆13Jan 16, 2024Updated 2 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆43Oct 4, 2021Updated 4 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Dec 13, 2023Updated 2 years ago
- DebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.☆102Sep 18, 2023Updated 2 years ago