misterch0c / TinyNukeLinks
zeus-style banking trojan
☆14Updated 8 years ago
Alternatives and similar repositories for TinyNuke
Users that are interested in TinyNuke are comparing it to the libraries listed below
Sorting:
- A curated list of awesome Security Hardening techniques for Windows.☆19Updated 8 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆23Updated 7 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22Updated 10 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆40Updated 9 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆50Updated 8 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆25Updated 2 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Suru is one of the original Man In The Middle (MITM) proxies that sits between the user's browser and the web application.☆28Updated 8 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆20Updated 9 years ago
- A network data locater using credentials obtained during penetration tests☆32Updated 11 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- SkyRAT - Powershell Remote Administration Tool☆32Updated 7 years ago
- [Exploit] vBulletin 5.1.x - PreAuth Remote Code Execution☆19Updated 3 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 6 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Updated 9 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆48Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 9 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 6 months ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆19Updated 8 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 8 years ago
- Post-Exploitation Framework☆78Updated 8 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆34Updated 8 years ago
- A simple worm that uses brute force and dictionary attacks through the network to infect vulnerable machines☆29Updated 9 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Updated 9 years ago
- PowerShell Reverse HTTPs Shell☆28Updated 10 years ago