maxamin / Zombie-Content-management-systems-exploitation-Bot-Source
Zombie Content management systems exploitation Bot Source
☆10Updated 3 years ago
Alternatives and similar repositories for Zombie-Content-management-systems-exploitation-Bot-Source:
Users that are interested in Zombie-Content-management-systems-exploitation-Bot-Source are comparing it to the libraries listed below
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆15Updated 3 years ago
- legacy Botnets source code Forked from github.com/malwares☆21Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 2 years ago
- ☆14Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated 11 months ago
- ☆14Updated 3 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 3 years ago
- UAdmin Phishlets for common sites☆13Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆38Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- conti locker ransomware source code leak☆31Updated 3 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆18Updated 11 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Powerfull scripts to bypass windows defender☆9Updated 3 years ago
- How to bypass antivirus 2020☆7Updated 4 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆9Updated 3 years ago
- web based c2 🏴☠️☆13Updated 7 months ago
- Windows 权限提升 BadPotato☆12Updated 3 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- 🧿Join your two exe files☆11Updated 4 years ago
- An attempt to make a LoadLibrary designed for offensive operations, in C# obviously.☆55Updated 3 years ago
- Remote Thread Injection by C# + Delegate Techniques☆12Updated last year
- Conquer the deep ocean, host an .onion site fast!☆15Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Machine Learning basics with phishing dataset☆10Updated 3 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago