r00t-3xp10it / backdoorppt
transform your payload.exe into one fake word doc (.ppt)
☆465Updated 5 years ago
Alternatives and similar repositories for backdoorppt:
Users that are interested in backdoorppt are comparing it to the libraries listed below
- NXcrypt - 'python backdoor' framework☆365Updated 7 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆603Updated 3 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 7 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆290Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 8 months ago
- Python / C# Unmanaged PowerShell based RAT☆780Updated 2 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950Updated 5 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C server☆499Updated 5 years ago
- Cloak can backdoor any python script with some tricks.☆493Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,409Updated 6 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆545Updated 6 months ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225Updated 3 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆206Updated 4 years ago
- Pythonic ransomware proof of concept.☆218Updated 4 years ago
- A Phishing Dropper designed to Pentest.☆272Updated 7 years ago
- Inject malicious code into *.debs☆274Updated 2 years ago
- Undetectable Windows Payload Generation☆1,591Updated 2 years ago
- collection of articles/books about programing☆568Updated last year
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Updated last year
- Steal Net-NTLM Hash using Bad-PDF☆1,105Updated 4 years ago
- Hacking systems with the automation of PasteJacking attacks.☆396Updated 6 months ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆345Updated 7 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆246Updated last year
- Micro$oft Windows Hacking Pack☆520Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆317Updated 6 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆283Updated 4 years ago
- Collection of social engineering payloads☆297Updated 7 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆341Updated 4 years ago