r00t-3xp10it / PandoraBoxLinks
Transform your batch (bat) script into one binary.exe
β51Updated last year
Alternatives and similar repositories for PandoraBox
Users that are interested in PandoraBox are comparing it to the libraries listed below
Sorting:
- π Reverse shell written on python3β15Updated 4 years ago
- Disable Windows Defender All Versionβ32Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one toβ¦β60Updated 4 years ago
- cross-platform C2 framework in python 2β41Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ16Updated 4 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.β13Updated 5 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β32Updated 6 years ago
- gui tool to create normal payload by msfvenomβ34Updated 6 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.β17Updated 4 years ago
- Reverse shell using Windows Registry files (.reg)β17Updated 5 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijackingβ42Updated 5 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ23Updated 3 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β41Updated 4 years ago
- recover Firefox and more browsers loginsβ49Updated 3 years ago
- A powerful reverse shell generatorβ44Updated 3 years ago
- Passwordless RDP Session Hijackingβ69Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architectureβ77Updated 2 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)β59Updated 3 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.β30Updated 3 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ18Updated 5 years ago
- A simple python reverse shell written just for fun.β64Updated 2 years ago
- Repository of tools used in my blogβ52Updated last year
- Post-Exploitation module for Penetration Tester and Hackers.β27Updated 3 years ago
- Using bitsadmin to download our malware and to bypass defenderβ27Updated 4 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defenderβ37Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ30Updated 6 years ago
- Exploits for some of the vulnerabilities I have discoveredβ18Updated 5 years ago
- Simple C2 over the Trello APIβ39Updated 2 years ago
- π₯ Pentest Cheat Sheetβ37Updated 4 years ago