maxamin / Zombie-Content-management-systems-exploitation-Bot-Source
Zombie Content management systems exploitation Bot Source
☆10Updated 3 years ago
Alternatives and similar repositories for Zombie-Content-management-systems-exploitation-Bot-Source:
Users that are interested in Zombie-Content-management-systems-exploitation-Bot-Source are comparing it to the libraries listed below
- exploitpack extracted from a honeynet which is being prepared by intruduers to be used as an exploitation infrastructure☆15Updated 3 years ago
- legacy Botnets source code Forked from github.com/malwares☆22Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- ☆10Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 3 years ago
- ☆14Updated 3 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- ShellC0de Generator☆11Updated 3 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- Runpe + DInvoke + Syscall☆16Updated 3 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆14Updated last year
- It embeds the executable file or payload inside the zip/rar file. It can use two different methods. The first method embeds the executab…☆41Updated 2 years ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++…☆15Updated last year
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆9Updated 3 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆11Updated 2 years ago
- A repository with my notable code snippets for Offensive Security's PEN-300 (OSEP) course.☆10Updated 3 years ago
- ☆14Updated 2 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆20Updated last year
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 5 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.☆8Updated 4 years ago
- Utilizing Alternative Shellcode Execution Via Callbacks☆13Updated last year
- 🔅 Reverse shell written on python3☆14Updated 4 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- ☆10Updated 3 years ago