marco-liberale / PasteBomb
PasteBomb C2-less RAT
☆316Updated 2 months ago
Alternatives and similar repositories for PasteBomb:
Users that are interested in PasteBomb are comparing it to the libraries listed below
- Wordlist to crack .zip-file password☆201Updated 2 years ago
- Phishing with a fake reCAPTCHA☆464Updated 4 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆650Updated 8 months ago
- Embed a payload inside a PNG file☆282Updated 2 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆156Updated 11 months ago
- ☆277Updated 7 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆345Updated last year
- What the name says....☆89Updated 4 months ago
- EDR & Antivirus Bypass to Gain Shell Access☆232Updated 3 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆312Updated 3 months ago
- ☆519Updated 9 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆293Updated last year
- Search & Parse Password Leaks☆307Updated 3 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆216Updated 9 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆310Updated last week
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆346Updated this week
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆503Updated 8 months ago
- Automation tool to testing and confirm the xss vulnerability.☆193Updated this week
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆275Updated 7 months ago
- PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.☆403Updated last year
- Make BASH stealthy and hacker friendly with lots of bash functions☆221Updated last week
- HTTP 403 bypass tool☆476Updated 10 months ago
- A SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them bi…☆330Updated 6 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆347Updated 9 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆336Updated 3 weeks ago
- A RedTeam Toolkit☆390Updated 2 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆335Updated last month
- Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.☆271Updated 2 weeks ago
- MacOS S☆163Updated last month