pxcs / 7R0J4N
This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. 7R0J4N is developed and operated by a sophisticated group of malicious Cyber Actors and has evolved into a highly modular, multi stage Backdoor..
โ27Updated 4 months ago
Related projects: โ
- Kerberos Attacks, obtaining password hashes. ๐๐ฟ๐ฎ๐ฐ๐ธ๐ ๐ผ๐ฝ๐๐ ๐ฒ๐ฐ focuses on the acquisition of TGS, specifically those related to seโฆโ30Updated last week
- Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of ๐ง๐ฒ๐ฒ๐๐ต cybertooth && ๐๐ผ๐ตโฆโ50Updated 2 months ago
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cโฆโ34Updated 2 months ago
- Seven Degrees of Domain Adminโ55Updated this week
- Data and exploit collector for SharpHound to BloodHound. This software will automatically determine what domain or directory the current โฆโ75Updated last month
- ๐ฐ๐ช WannaCry ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security Aโฆโ38Updated 4 months ago
- Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since ๐๐ฟ๐ฎ๐ฐ๐๐ฒ๐ฟ ๐๐น๐ถ๐๐ implements many paโฆโ23Updated 2 months ago
- Six Degrees of Domain Adminโ28Updated last week
- Enhance swiss army knife, for penetration testing networks. Kerberos attacks and passwords spraying. Additionally, a database is used to โฆโ19Updated last week
- Pegasus, the spyware that represents a significant threat to privacy and security, showcasing the capabilities of modern surveillance tecโฆโ12Updated 3 months ago
- Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.โ15Updated 2 months ago
- Hook ( grab ) a frequency sessions, a bundle of customs firmware. A high intensity of the RF environment will also likely make this attacโฆโ11Updated 2 months ago
- P O I S O N I N Gโ15Updated 2 months ago
- offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass sevโฆโ16Updated 2 months ago
- ( Cracking Authentication ) this software will help you to pentesting a services and attempts to exploit the authentication process. a weโฆโ13Updated 2 months ago
- Three headed dog, Kerberos Attacks. Cracking the system or router that provides a gateway for Active Directory.โ17Updated 4 months ago
- Github Profile Readmeโ18Updated this week
- Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.โ9Updated 2 months ago
- Rootkit and Kernel attack kit, ๐๐๐ฎ๐ฏ๐ฒ๐น๐น๐ฎ program will enables cyber attacks to gain access to and infiltrate data from machines wiโฆโ8Updated 2 months ago
- Automatic Injection attacks. Blind SQL, NoSQL, SQL, Blind GQL, GQL, Command, LDAP, Traversal, JNDI, JDBC, Esi, El, Etc. Clear mapping.โ30Updated 3 weeks ago
- Versatile tool for BloodHound, an attack research kit in my own version and modificationโ10Updated 4 months ago
- encrypting directory and access. If the attackers find a 'scripts' that execute the commands based on external inputs, they might exploitโฆโ10Updated 2 months ago
- Combining 'authentication' and 'grilling' to convey. Active directory ( trust attack ). performing an advance Kerberos attack may result โฆโ12Updated 3 months ago
- configurations and deprecated payloadsโ10Updated 2 months ago
- remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the kerโฆโ10Updated 2 months ago
- TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. โฆโ43Updated 2 months ago
- Advance web scanner. It is designed to identify various security vulnerabilities in web applications by scanning for misconfigurations, iโฆโ13Updated 2 months ago
- Abusive & Offensive ( 7R0J4N ) remote access for any smartphones, most advance on Android. crowdown is software that gives a person full โฆโ16Updated last month
- ๐๐ฟ๐ฎ๐ ๐๐ฅ๐ฎ๐ is a Notorious Smartphones Malware family, known for its Remote Administration & Access Tools, which include remote Deviโฆโ56Updated last month
- BOF and Python3 implementation of technique to unbind 445/tcp on Windows via SCM interactionsโ242Updated last month