maxamin / Zombie-Content-management-systems-exploitation-Bot-Source
Zombie Content management systems exploitation Bot Source
☆10Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Zombie-Content-management-systems-exploitation-Bot-Source
- Recon-ng modules for basic OSINT.☆10Updated 2 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated last year
- Files related to my training classes☆15Updated 3 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆14Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Runpe + DInvoke + Syscall☆16Updated 3 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 2 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- ☆14Updated 2 years ago
- Javascript Botnet☆22Updated 6 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆9Updated 2 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆12Updated 7 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Windows Malware Probe of Concept☆21Updated 2 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 3 years ago