r00t-3xp10it / PandoraBoxLinks
Transform your batch (bat) script into one binary.exe
β51Updated last year
Alternatives and similar repositories for PandoraBox
Users that are interested in PandoraBox are comparing it to the libraries listed below
Sorting:
- π Reverse shell written on python3β14Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.β37Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ16Updated 4 years ago
- Disable Windows Defender All Versionβ31Updated 4 years ago
- cross-platform C2 framework in python 2β39Updated 3 years ago
- Passwordless RDP Session Hijackingβ69Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ23Updated 3 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β33Updated 6 years ago
- gui tool to create normal payload by msfvenomβ34Updated 6 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one toβ¦β59Updated 4 years ago
- A simple python reverse shell written just for fun.β64Updated 2 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ30Updated 6 years ago
- Reverse shell using Windows Registry files (.reg)β17Updated 5 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.β12Updated 5 years ago
- Tool to brute website sub-domains and dirs.β47Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β42Updated 4 years ago
- Repository of tools used in my blogβ51Updated last year
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ17Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 4 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defenderβ37Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ19Updated 5 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijackingβ42Updated 5 years ago
- recover Firefox and more browsers loginsβ48Updated 3 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)β59Updated 4 years ago
- Exploits for some of the vulnerabilities I have discoveredβ19Updated 5 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsβ18Updated 4 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspaceβ28Updated 4 years ago
- A python Code to obfuscate any non-fud python payload and generate a ready to use FUD Python executable scriptβ24Updated 6 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.β114Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.β50Updated last year