misterch0c / TinyNuke
zeus-style banking trojan
☆14Updated 7 years ago
Related projects: ⓘ
- A curated list of awesome Security Hardening techniques for Windows.☆19Updated 7 years ago
- ☆12Updated this week
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- ☆18Updated this week
- Brazilian banker malware identified by Notificacao_Infracao_De_Transito_99827462345231.js☆11Updated 6 years ago
- ☆13Updated this week
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆21Updated 6 years ago
- Twitter Bot to perform advanced search and automated response☆13Updated 6 years ago
- Specify targets and run sets of tools against them☆10Updated 9 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆21Updated 9 years ago
- A Remote Administration Tool coded in C#☆20Updated 12 years ago
- Python script for trying default passwords for some TP-Link Hotspots☆34Updated 3 years ago
- ☆45Updated this week
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Updated 6 years ago
- collection of useful shells for penetration tests☆36Updated 7 years ago
- Miscellaneous projects related to attacking Windows.☆27Updated 5 years ago
- Social Engineering: Simple way to make a fake file for Backdoors☆24Updated last year
- Web-based Source Code Vulnerability Scanner☆19Updated 8 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆17Updated 7 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆20Updated 7 years ago
- ☆21Updated this week
- ☆40Updated this week
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆38Updated 8 years ago
- Simple security surveillance script for linux distributions.☆56Updated 7 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆48Updated 7 years ago
- Attacking WPA/WPA encrypted access point without client.☆46Updated 10 years ago
- Converts a command to a base64 powershell compatible string☆24Updated 10 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- ssh session type for metasploit☆97Updated last year