marco-liberale / PasteBomb
PasteBomb C2-less RAT
☆319Updated 6 months ago
Alternatives and similar repositories for PasteBomb
Users that are interested in PasteBomb are comparing it to the libraries listed below
Sorting:
- Embed a payload inside a PNG file☆316Updated 6 months ago
- Wordlist to crack .zip-file password☆202Updated 2 years ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆749Updated last month
- HTTP 403 bypass tool☆510Updated last year
- A suite for hunting suspicious targets, expose domains and phishing discovery☆357Updated 3 weeks ago
- Shodan Dorks 2023☆233Updated 4 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆382Updated 7 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆295Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆246Updated last month
- ☆289Updated 11 months ago
- A RedTeam Toolkit☆397Updated last month
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆216Updated last year
- Polymorphic Command & Control☆78Updated 2 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆374Updated 4 months ago
- ☆542Updated last year
- EDR & Antivirus Bypass to Gain Shell Access☆237Updated 7 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆295Updated 2 weeks ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆537Updated 2 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆129Updated 4 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆295Updated 11 months ago
- Make BASH stealthy and hacker friendly with lots of bash functions☆257Updated this week
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆245Updated last month
- TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and…☆429Updated 11 months ago
- Header Exploitation HTTP☆505Updated last month
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆347Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆270Updated 2 months ago
- Docker Remote API Scanner and Exploit☆171Updated last year
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆296Updated 3 weeks ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆96Updated 10 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆340Updated last year