malwarekid / VBS-StagerLinks
Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides an option to add persistence for automatic execution on system startup.
☆13Updated last year
Alternatives and similar repositories for VBS-Stager
Users that are interested in VBS-Stager are comparing it to the libraries listed below
Sorting:
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Automate Blind SQL Injection with Python.☆23Updated 2 years ago
- ☆14Updated 3 months ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated last year
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 2 years ago
- Malware Libraries focused in help Malware Development☆23Updated 2 years ago
- web based c2 🏴☠️☆13Updated 10 months ago
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆22Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 10 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆19Updated 2 years ago
- ☆25Updated 2 years ago
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- A script to automate keystrokes through a graphical desktop program.☆35Updated 2 weeks ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated 11 months ago
- Enumeration & fingerprint tool☆25Updated last year
- Cobalt Strike BOFS☆16Updated last year
- Red Team Infrastructure: Covenant C2☆10Updated 5 years ago
- Create PDFs with HTML smuggling attachments that save on opening the document.☆29Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆22Updated 4 months ago
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆24Updated 11 months ago
- ECC Public Key Cryptography☆38Updated last year
- exfiltration/infiltration toolkit☆23Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- AMSI Bypass for powershell☆30Updated 3 years ago
- Advanced network security tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integr…☆12Updated last year