r00t-3xp10it / PandoraBoxLinks
Transform your batch (bat) script into one binary.exe
β51Updated last year
Alternatives and similar repositories for PandoraBox
Users that are interested in PandoraBox are comparing it to the libraries listed below
Sorting:
- Disable Windows Defender All Versionβ31Updated 4 years ago
- π Reverse shell written on python3β14Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.β37Updated 3 years ago
- cross-platform C2 framework in python 2β39Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generatorβ16Updated 4 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one toβ¦β59Updated 4 years ago
- gui tool to create normal payload by msfvenomβ34Updated 6 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits keyβ30Updated 6 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a decβ¦β33Updated 6 years ago
- Automate the creation of Backdoors and postexplotation activitiesβ23Updated 3 years ago
- A script to obfuscate powershell payloads , bypassing AMSI.dll and Windows Defenderβ37Updated 6 years ago
- Repository of tools used in my blogβ52Updated last year
- Passwordless RDP Session Hijackingβ68Updated 4 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.β17Updated 5 years ago
- Inject Macro and DDE code into Excel and Word documents (reverse shell)β60Updated 4 years ago
- recover Firefox and more browsers loginsβ48Updated 3 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.β12Updated 5 years ago
- A powerful reverse shell generatorβ45Updated 3 years ago
- Python3 script to generate Office macros for the EvilOSX framework. Author: Cedric Owensβ28Updated 4 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.β28Updated 4 months ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)β43Updated 4 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationβ19Updated 5 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Freeβ23Updated 6 years ago
- Exploits for some of the vulnerabilities I have discoveredβ19Updated 5 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β20Updated 3 years ago
- Tool to brute website sub-domains and dirs.β47Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (Pβ¦β33Updated 6 years ago
- A Remote Access Tool using Google Apps Script as the proxy for command and control.β114Updated 4 years ago
- Malicious DLL (Reverse Shell) generator for DLL Hijackingβ43Updated 5 years ago