marco-liberale / PasteBomb
PasteBomb C2-less RAT
☆316Updated 3 months ago
Alternatives and similar repositories for PasteBomb:
Users that are interested in PasteBomb are comparing it to the libraries listed below
- Embed a payload inside a PNG file☆291Updated 3 months ago
- A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage Power…☆653Updated 9 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆315Updated last month
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆278Updated 8 months ago
- Bear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of…☆327Updated 4 months ago
- Evilginx Phishing Infrastructure Setup Guide - Securing Evilginx and Gophish Infrastructure, Removing IOCs, Phishing TTPs☆339Updated 2 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆123Updated last month
- sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment☆545Updated this week
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆346Updated last year
- Automation tool to testing and confirm the xss vulnerability.☆215Updated 2 weeks ago
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆485Updated last week
- ☆530Updated 10 months ago
- Search & Parse Password Leaks☆326Updated 4 months ago
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆357Updated 2 months ago
- Golang library for malware development☆342Updated 3 months ago
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆214Updated 10 months ago
- Shodan Dorks 2023☆232Updated last month
- ☆403Updated this week
- EDR & Antivirus Bypass to Gain Shell Access☆231Updated 4 months ago
- Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC☆159Updated last year
- Remote Kerberos Relay made easy! Advanced Kerberos Relay Framework☆552Updated 7 months ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆350Updated 10 months ago
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆520Updated 9 months ago
- Header Exploitation HTTP☆396Updated 2 weeks ago
- A RedTeam Toolkit☆395Updated 4 months ago
- Polymorphic Command & Control☆65Updated 4 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆294Updated last year