r00t-3xp10it / trojanizer
Trojanize your payload - WinRAR (SFX) automatization - under Linux distros
☆288Updated 7 years ago
Alternatives and similar repositories for trojanizer:
Users that are interested in trojanizer are comparing it to the libraries listed below
- transform your payload.exe into one fake word doc (.ppt)☆465Updated 5 years ago
- My collection of metasploit auxiliary post-modules☆190Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆283Updated 5 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆437Updated 7 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆332Updated 7 months ago
- NXcrypt - 'python backdoor' framework☆363Updated 7 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 3 years ago
- Python / C# Unmanaged PowerShell based RAT☆777Updated last year
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆185Updated 6 years ago
- Multiplatform payload dropper☆268Updated 3 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆245Updated last year
- A payload stager using PowerShell☆183Updated 5 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆339Updated 3 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.☆134Updated 5 years ago
- Shadow Brokers NSA fuzzbunch tool leak . With windows auto instalation script☆199Updated 4 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆295Updated 7 years ago
- mosquito - Automating reconnaissance and brute force attacks☆130Updated 5 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆282Updated 4 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆544Updated 5 months ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆279Updated last year
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆441Updated last year
- metasploitHelper☆246Updated 4 years ago
- Script to steal passwords from ssh.☆478Updated 6 years ago
- Cloak can backdoor any python script with some tricks.☆489Updated 5 years ago
- Python based Remote Administration Tool(RAT)☆91Updated 4 years ago
- An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red te…☆287Updated 4 months ago
- C# code for Transferring Backdoor Payloads by DNS Traffic and Bypassing Anti-viruses☆268Updated last year