pxcs / pegasus_spyware
Pegasus, the spyware that represents a significant threat to privacy and security, showcasing the capabilities of modern surveillance technology. Its use highlights the ongoing tensions between security, privacy, and the ethical considerations of surveillance practices. Once installed, Pegasus evading detection from anything.
โ12Updated 3 months ago
Related projects: โ
- Rootkit and Kernel attack kit, ๐๐๐ฎ๐ฏ๐ฒ๐น๐น๐ฎ program will enables cyber attacks to gain access to and infiltrate data from machines wiโฆโ8Updated 2 months ago
- Docker Payload ( Bypass anti virus ). Payload data at the endpoint when running NestJS application inside a Docker container.โ15Updated 2 months ago
- Release Neo, the Evil Ducky scripts into any Hardware or drive and watch that Devices burn.โ9Updated 2 months ago
- Kerberoasting ( Kerberos Attacks ). From networks or Domain controller log perspective, since ๐๐ฟ๐ฎ๐ฐ๐๐ฒ๐ฟ๐๐น๐ถ๐๐ implements many paโฆโ23Updated 2 months ago
- This malware is often used to form Botnets, enabling initial access for the Cyber Attacks Ransomware or Ryuk banking Trojan. 7R0J4N is deโฆโ27Updated 4 months ago
- Kerberos Attacks, obtaining password hashes. ๐๐ฟ๐ฎ๐ฐ๐ธ๐ ๐ผ๐ฝ๐๐ ๐ฒ๐ฐ focuses on the acquisition of TGS, specifically those related to seโฆโ30Updated last week
- Teeth - smilodon cybertooth is a password decryption utilities for online services & offline hashes, fastest and most advanced password cโฆโ34Updated 2 months ago
- ๐ฐ๐ช WannaCry ๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ. This malware spread by using a vulnerability exploit called 'EternalBlue'. The US National Security Aโฆโ38Updated 4 months ago
- ( Cracking Authentication ) this software will help you to pentesting a services and attempts to exploit the authentication process. a weโฆโ13Updated 2 months ago
- Enhance swiss army knife, for penetration testing networks. Kerberos attacks and passwords spraying. Additionally, a database is used to โฆโ19Updated last week
- Hook ( grab ) a frequency sessions, a bundle of customs firmware. A high intensity of the RF environment will also likely make this attacโฆโ11Updated 2 months ago
- Three headed dog, Kerberos Attacks. Cracking the system or router that provides a gateway for Active Directory.โ17Updated 4 months ago
- encrypting directory and access. If the attackers find a 'scripts' that execute the commands based on external inputs, they might exploitโฆโ10Updated 2 months ago
- Data and exploit collector for SharpHound to BloodHound. This software will automatically determine what domain or directory the current โฆโ75Updated last month
- offshore is the most brutal and advance host hunter, ready and steady for rubella ( 7R0J4N ) trojan infections to be spreaded. Bypass sevโฆโ16Updated 2 months ago
- Perform a ( hard-core ) force attack to get the correct credentials in under one minute, with the help of ๐ง๐ฒ๐ฒ๐๐ต cybertooth && ๐๐ผ๐ตโฆโ50Updated 2 months ago
- P O I S O N I N Gโ15Updated 2 months ago
- Six Degrees of Domain Adminโ28Updated last week
- Seven Degrees of Domain Adminโ55Updated this week
- Automatic Injection attacks. Blind SQL, NoSQL, SQL, Blind GQL, GQL, Command, LDAP, Traversal, JNDI, JDBC, Esi, El, Etc. Clear mapping.โ30Updated 3 weeks ago
- remote access trojan, RAT tools for penetration testing on a devices, access real time with client devices after the malware hits the kerโฆโ10Updated 2 months ago
- configurations and deprecated payloadsโ10Updated 2 months ago
- Github Profile Readmeโ18Updated this week
- Combining 'authentication' and 'grilling' to convey. Active directory ( trust attack ). performing an advance Kerberos attack may result โฆโ12Updated 3 months ago
- Versatile tool for BloodHound, an attack research kit in my own version and modificationโ10Updated 4 months ago
- Advance web scanner. It is designed to identify various security vulnerabilities in web applications by scanning for misconfigurations, iโฆโ13Updated 2 months ago
- Abusive & Offensive ( 7R0J4N ) remote access for any smartphones, most advance on Android. crowdown is software that gives a person full โฆโ16Updated last month
- TheFatRat : Remote control Access Devices and exploiting tool, used as a deadly Backdoor generator that bypass most anti virus software. โฆโ43Updated 2 months ago
- ๐๐ฟ๐ฎ๐ ๐๐ฅ๐ฎ๐ is a Notorious Smartphones Malware family, known for its Remote Administration & Access Tools, which include remote Deviโฆโ56Updated last month
- โ13Updated 4 months ago