marco-liberale / PasteBomb
PasteBomb C2-less RAT
☆320Updated 4 months ago
Alternatives and similar repositories for PasteBomb:
Users that are interested in PasteBomb are comparing it to the libraries listed below
- Demonized Shell is an Advanced Tool for persistence in linux.☆367Updated 2 months ago
- Embed a payload inside a PNG file☆302Updated 5 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆689Updated 10 months ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- ☆287Updated 9 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆126Updated 2 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆286Updated 9 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆234Updated 6 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆242Updated 6 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆294Updated last year
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆352Updated 5 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆150Updated 3 weeks ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆412Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆224Updated last month
- ☆447Updated last week
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆268Updated last week
- HTTP 403 bypass tool☆501Updated last year
- A RedTeam Toolkit☆394Updated last week
- FBI Watchdog is an OSINT tool that monitors domain seizures and DNS record changes in real time, alerting users to law enforcement takedo…☆261Updated 3 weeks ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated last year
- For educational purposes only, samples of ransomware/wiper trojans including screenshots/ransom-notes.☆218Updated this week
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆293Updated last year
- Helios: Automated XSS Testing☆147Updated 7 months ago
- Generate FUD backdoors☆244Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 3 months ago
- Script for generating revshells☆466Updated 6 months ago
- Header Exploitation HTTP☆480Updated last week
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆367Updated 3 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year
- A fast WordPress plugin enumeration tool☆296Updated last week