Use a Fake image.jpg to exploit targets (hide known file extensions)
☆938May 28, 2025Updated 10 months ago
Alternatives and similar repositories for FakeImageExploiter
Users that are interested in FakeImageExploiter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- transform your payload.exe into one fake word doc (.ppt)☆469Dec 8, 2019Updated 6 years ago
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆876Dec 28, 2018Updated 7 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆444Jul 11, 2017Updated 8 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆294Feb 28, 2018Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,460Nov 3, 2018Updated 7 years ago
- venom - C2 shellcode generator/compiler/handler☆1,941Dec 9, 2023Updated 2 years ago
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- Undetectable Windows Payload Generation☆1,608Nov 8, 2022Updated 3 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆76Nov 25, 2016Updated 9 years ago
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,150Mar 17, 2024Updated 2 years ago
- Malicious Macro Generator☆832Apr 17, 2019Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Image Payload Creating/Injecting tools☆1,291Nov 30, 2023Updated 2 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,422Jul 20, 2020Updated 5 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- A Phishing Dropper designed to Pentest.☆273May 15, 2017Updated 8 years ago
- C2 Powershell Command & Control Framework with BuiltIn Commands☆507Mar 11, 2024Updated 2 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆600Jul 18, 2021Updated 4 years ago
- Python antivirus evasion tool☆1,448Oct 21, 2023Updated 2 years ago
- Python / C# Unmanaged PowerShell based RAT☆774Mar 29, 2023Updated 3 years ago
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆2,346Sep 12, 2022Updated 3 years ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,728Oct 8, 2023Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,177Mar 23, 2023Updated 3 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,837Jan 19, 2020Updated 6 years ago
- mosquito - Automating reconnaissance and brute force attacks☆131Dec 9, 2019Updated 6 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 3 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49May 16, 2017Updated 8 years ago
- A Ruby framework designed to aid in the penetration testing of WordPress systems.☆1,044Nov 24, 2019Updated 6 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,211Oct 9, 2023Updated 2 years ago
- macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other f…☆2,299Aug 15, 2024Updated last year
- iOS/macOS/Linux Remote Administration Tool☆1,749Mar 25, 2021Updated 5 years ago
- collection of articles/books about programing☆589Dec 20, 2023Updated 2 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago