r00t-3xp10it / trojanizerLinks
Trojanize your payload - WinRAR (SFX) automatization - under Linux distros
☆290Updated 7 years ago
Alternatives and similar repositories for trojanizer
Users that are interested in trojanizer are comparing it to the libraries listed below
Sorting:
- My collection of metasploit auxiliary post-modules☆191Updated 6 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆439Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆223Updated 4 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆331Updated 11 months ago
- NXcrypt - 'python backdoor' framework☆367Updated 8 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆188Updated 6 years ago
- metasploitHelper☆249Updated 5 years ago
- Multiplatform payload dropper☆275Updated 3 years ago
- A Phishing Dropper designed to Pentest.☆272Updated 8 years ago
- A tool to generate obfuscated one liners to aid in penetration testing☆179Updated 6 years ago
- Collection of social engineering payloads☆297Updated 7 years ago
- PowerShell Empire mod to post-exploit the World!☆137Updated 6 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆279Updated last year
- WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisener☆206Updated 6 years ago
- Terminator metasploit payload generator☆179Updated 7 years ago
- A payload stager using PowerShell☆184Updated 5 years ago
- This is a collection of social engineering tricks and payloads being used for credential theft and spear phishing attacks.☆346Updated 7 years ago
- just for fun ¯\_(ツ)_/¯☆273Updated 8 years ago
- Inject malicious code into *.debs☆277Updated 3 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆249Updated last year
- mosquito - Automating reconnaissance and brute force attacks☆131Updated 5 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.☆343Updated 4 years ago
- A simple utility to convert EXE files to JPEG images and vice versa.☆201Updated 9 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆125Updated 2 years ago
- Pythonic ransomware proof of concept.☆219Updated 5 years ago
- HERCULES is a special payload generator that can bypass antivirus softwares.☆602Updated 3 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆86Updated 7 years ago
- Simple python backdoor with Ngrok tunnel support☆205Updated last year