msOlivers / pyExploit
Bypass AntiVirus with Python and Metasploit using shellcode
☆12Updated 9 years ago
Alternatives and similar repositories for pyExploit:
Users that are interested in pyExploit are comparing it to the libraries listed below
- Passwordless RDP Session Hijacking☆66Updated 3 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- this makes your payloads, trojans, viruses fully undetectable☆7Updated 7 years ago
- using VBS to download and install a powershell malware☆40Updated 5 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆100Updated 7 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 5 years ago
- cross-platform C2 framework in python 2☆41Updated 2 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- PowerShell Reverse HTTPs Shell☆27Updated 10 years ago
- HTTP BOTNET☆8Updated 2 years ago
- Kill Any Antivirus Using Python For Windows Users .☆44Updated 8 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆96Updated 2 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- ☆19Updated 7 years ago
- ⛔🛡️ WeDefend - Monitor and Protect Windows from Remote Access Trojan☆25Updated 6 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆26Updated 7 years ago
- Download and loader .NET payload☆35Updated 5 years ago
- Converts a command to a base64 powershell compatible string☆26Updated 10 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 4 months ago
- Create a worm that bruteforces SSH and "infect" the system.☆26Updated 8 years ago
- HTTP botnet☆61Updated 8 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- Data Exfiltration via HTTP Traffic (C# and Shell Script)☆17Updated last year
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆8Updated last year
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Zero-Day Code Injection and Persistence Technique☆26Updated 8 years ago
- Android remote administration client☆10Updated 6 years ago