peterpt / fuzzbunch
Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script
☆204Updated 4 years ago
Alternatives and similar repositories for fuzzbunch:
Users that are interested in fuzzbunch are comparing it to the libraries listed below
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆442Updated last year
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆340Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆290Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 8 months ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆276Updated 2 years ago
- mosquito - Automating reconnaissance and brute force attacks☆130Updated 5 years ago
- just for fun ¯\_(ツ)_/¯☆264Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆522Updated 2 years ago
- Python / C# Unmanaged PowerShell based RAT☆779Updated 2 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- Simple python backdoor with Ngrok tunnel support☆203Updated last year
- APT34/OILRIG leak☆231Updated 6 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆329Updated 7 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆252Updated last year
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆237Updated 4 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆268Updated last year
- unix SSH post-exploitation 1337 tool☆136Updated 6 years ago
- Search Exploitable Software on Linux☆227Updated 2 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆344Updated 7 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆295Updated 7 years ago
- WebShell Dump☆172Updated 8 years ago
- Remote Command Execution as SYSTEM on Windows IoT Core (releases available for Python2.7 & Python3)☆380Updated 4 years ago
- metasploitHelper☆247Updated 5 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆639Updated last year