peterpt / fuzzbunch
Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script
☆206Updated 4 years ago
Alternatives and similar repositories for fuzzbunch:
Users that are interested in fuzzbunch are comparing it to the libraries listed below
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆443Updated last year
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆290Updated 7 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆178Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)☆467Updated 5 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254Updated 2 years ago
- APT34/OILRIG leak☆231Updated 6 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆342Updated 4 years ago
- Python / C# Unmanaged PowerShell based RAT☆777Updated 2 years ago
- mosquito - Automating reconnaissance and brute force attacks☆130Updated 5 years ago
- just for fun ¯\_(ツ)_/¯☆270Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆523Updated 2 years ago
- A client compatible with Metasploit's staging protocol☆257Updated 7 years ago
- Script used to generate and encode a PowerShell based Metasploit payloads.☆276Updated 3 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆333Updated 9 months ago
- Linux Privilege Escalation Tool☆184Updated 6 years ago
- Simple python backdoor with Ngrok tunnel support☆204Updated last year
- ispy V1.0 - Eternalblue(ms17-010)/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )☆236Updated 4 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆544Updated 4 years ago
- Reverse Shell Cheat Sheet TooL☆295Updated 4 years ago
- CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.☆329Updated 7 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- Inline file transfer using in-built Windows tools (DEBUG.exe or PowerShell).☆314Updated 5 years ago
- PowerShell Empire mod to post-exploit the World!☆136Updated 6 years ago
- Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service☆170Updated 5 years ago
- Passwords Recovery Tool☆224Updated 4 years ago
- REPTILEHAUS' simplified build process of Worawit Wang' (@sleepya_) version of EternalBlue.. The NSA exploit brought to you by the ShadowB…☆125Updated 2 years ago
- Evading Anti-Virus with Unusual Technique☆214Updated 2 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆247Updated last year