Use a Fake image.jpg to exploit targets (hide known file extensions)
☆942May 28, 2025Updated 11 months ago
Alternatives and similar repositories for FakeImageExploiter
Users that are interested in FakeImageExploiter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- transform your payload.exe into one fake word doc (.ppt)☆469Dec 8, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆877Dec 28, 2018Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆290May 14, 2019Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆293Feb 28, 2018Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,465Nov 3, 2018Updated 7 years ago
- venom - C2 shellcode generator/compiler/handler☆1,948Dec 9, 2023Updated 2 years ago
- AntiVirus Evasion Tool☆1,752Apr 23, 2025Updated last year
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Nov 25, 2016Updated 9 years ago
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,210Mar 17, 2024Updated 2 years ago
- Malicious Macro Generator☆832Apr 17, 2019Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Image Payload Creating/Injecting tools☆1,293Nov 30, 2023Updated 2 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,420Jul 20, 2020Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆273May 15, 2017Updated 8 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆506Mar 11, 2024Updated 2 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Jul 18, 2021Updated 4 years ago
- Python antivirus evasion tool☆1,450Oct 21, 2023Updated 2 years ago
- Python / C# Unmanaged PowerShell based RAT☆775Mar 29, 2023Updated 3 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Find exploits in local and online databases instantly☆1,818Sep 27, 2021Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,351Sep 12, 2022Updated 3 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,737Oct 8, 2023Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,181Mar 23, 2023Updated 3 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,835Jan 19, 2020Updated 6 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Dec 9, 2019Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆726Nov 19, 2017Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆528Apr 14, 2023Updated 3 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,045Nov 24, 2019Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,219Oct 9, 2023Updated 2 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,301Aug 15, 2024Updated last year
- iOS/macOS/Linux Remote Administration Tool☆1,750Mar 25, 2021Updated 5 years ago
- collection of articles/books about programing☆589Updated this week
- PowerShell Empire Web Interface☆329May 20, 2023Updated 2 years ago