Exploitation Tool For Windows Using Batch and Powershell
☆21Dec 2, 2024Updated last year
Alternatives and similar repositories for BatSploit
Users that are interested in BatSploit are comparing it to the libraries listed below
Sorting:
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23May 8, 2018Updated 7 years ago
- Windows agent for Tactical RMM☆20Oct 12, 2020Updated 5 years ago
- Instagram Turbo written in python, requests is send with tcp client☆11Oct 8, 2020Updated 5 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- website admin panel finder☆34Dec 29, 2020Updated 5 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- This is a fuzzer for Windows SEH buffer overflow.☆15Oct 17, 2017Updated 8 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated 11 months ago
- Random stuff☆16Jun 28, 2018Updated 7 years ago
- Different utility scripts for pentesting and hacking.☆45Nov 10, 2017Updated 8 years ago
- "Polymorphic" shellcode generator (x86)☆25Oct 28, 2014Updated 11 years ago
- ☆12Apr 8, 2021Updated 4 years ago
- Phishing webapp generator☆41Aug 17, 2018Updated 7 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 8 years ago
- Opens a reverse PowerShell terminal to the client. Shell receives commands through TCP☆24Apr 18, 2015Updated 10 years ago
- Kahoot-Hack☆34Sep 13, 2019Updated 6 years ago
- An open source RansomWare☆88Nov 24, 2019Updated 6 years ago
- ☆16Jul 28, 2020Updated 5 years ago
- ☆12May 13, 2020Updated 5 years ago
- $2100 .Exe to .Doc Exploit (Python)☆52Dec 19, 2020Updated 5 years ago
- Small backdoor using cookie.☆63Oct 18, 2016Updated 9 years ago
- Hacking Wifi-Passwords,Chrome-Saved-Passwords,Copying the Scripts to Windows-Startup folder,Index-Sites-Files-Downloader☆30Dec 15, 2017Updated 8 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Everything you see on my tutorials is here in this repo☆10Jun 19, 2017Updated 8 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- ⛷ A collection of hacker scripts.☆28Jan 24, 2017Updated 9 years ago
- ☆27Apr 16, 2017Updated 8 years ago
- Simple PowerShell Base64 encoder to avoid detection of your malicious payload☆82Jun 5, 2018Updated 7 years ago
- Avoidz tool to bypass most A.V softwares☆139Sep 28, 2017Updated 8 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Aug 30, 2020Updated 5 years ago
- A simple Nessus results viewer☆49Aug 30, 2013Updated 12 years ago
- Download porn videos (Python)☆14Apr 12, 2018Updated 7 years ago
- Remote Windows shell☆32Jun 22, 2014Updated 11 years ago
- Custom Python 2.7 RAT☆10May 25, 2016Updated 9 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- Arduino+Si5351 = Antenna/Network Analyzer☆13Feb 10, 2019Updated 7 years ago
- Excel sheet for computing expected damage and point efficiency in Warhammer 40k 9th edition☆11Sep 23, 2025Updated 5 months ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago