proxyanon / BatSploit
Exploitation Tool For Windows Using Batch and Powershell
☆21Updated 3 months ago
Alternatives and similar repositories for BatSploit:
Users that are interested in BatSploit are comparing it to the libraries listed below
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Updated 7 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Updated 5 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- Gmail Knocker☆21Updated 7 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- Random stuff☆16Updated 6 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- 📡 A security research tool with shodan integration☆25Updated 6 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago
- Exploit XXE Out-Of-Band Vulnerability Easily☆14Updated 8 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 6 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Updated 10 years ago
- w3af packaging for Kali distribution☆26Updated 9 years ago
- Collection of Nmap scripts☆10Updated 9 years ago
- Software exploitation training material☆15Updated 7 years ago
- change mac address without using macchanger (NetworkManager9 clone bug)☆18Updated 8 years ago
- The Horrific Omnipotent Rootkit☆22Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Tool for automation of GUI-based testing.☆15Updated 10 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- ☆24Updated 6 years ago