r00t-3xp10it / PandoraBoxLinks
Transform your batch (bat) script into one binary.exe
β51Updated last year
Alternatives and similar repositories for PandoraBox
Users that are interested in PandoraBox are comparing it to the libraries listed below
Sorting:
- π Reverse shell written on python3β15Updated 4 years ago
- cross-platform C2 framework in python 2β41Updated 3 years ago
- Disable Windows Defender All Versionβ32Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.β36Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ16Updated 4 years ago
- gui tool to create normal payload by msfvenomβ34Updated 6 years ago
- Repository of tools used in my blogβ51Updated last year
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.β17Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ22Updated 3 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one toβ¦β60Updated 4 years ago
- Tool to brute website sub-domains and dirs.β47Updated 5 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defenderβ38Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ30Updated 6 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.β13Updated 4 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β32Updated 6 years ago
- fully automated c# reverse shells with automated ssh tunnelingβ6Updated 4 years ago
- A simple python reverse shell written just for fun.β65Updated 2 years ago
- PowerSploit - A PowerShell Post-Exploitation Frameworkβ18Updated 5 years ago
- Sp00fer blog post -β26Updated 2 years ago
- Reverse shell using Windows Registry files (.reg)β17Updated 5 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.β18Updated 7 years ago
- Using bitsadmin to download our malware and to bypass defenderβ27Updated 4 years ago
- Antiscan.me automatization scriptβ29Updated last year
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ19Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchangeβ16Updated 5 years ago
- An0n 3xPloiTeR Shellβ35Updated 5 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- NoSQL Injection Tool to bypass login forms & extract usernames/passwords using regular expressions.β30Updated 3 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &β¦β39Updated 3 years ago
- Passwordless RDP Session Hijackingβ69Updated 3 years ago