r00t-3xp10it / venomLinks
venom - C2 shellcode generator/compiler/handler
☆1,875Updated last year
Alternatives and similar repositories for venom
Users that are interested in venom are comparing it to the libraries listed below
Sorting:
- Python antivirus evasion tool☆1,431Updated last year
- Use a Fake image.jpg to exploit targets (hide known file extensions)☆916Updated 3 weeks ago
- An Python Script For Generating Payloads that Bypasses All Antivirus so far .☆982Updated last year
- MSFvenom Payload Creator (MSFPC)☆1,268Updated 4 years ago
- AntiVirus Evasion Tool☆1,710Updated last month
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,394Updated 4 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆732Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,417Updated 6 years ago
- Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor a…☆1,133Updated 2 years ago
- ☆997Updated 2 years ago
- Efficient and advanced man in the middle framework☆2,104Updated 2 years ago
- Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler☆1,183Updated 2 years ago
- Python Remote Administration Tool (RAT)☆3,344Updated last year
- Undetectable Windows Payload Generation☆1,601Updated 2 years ago
- Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor☆2,360Updated last year
- Unified repository for different Metasploit Framework payloads☆1,844Updated 3 weeks ago
- Veil 3.1.X (Check version info in Veil at runtime)☆4,119Updated last year
- Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy …☆1,174Updated 5 years ago
- CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems.☆2,545Updated 7 months ago
- Generate Gmail Emailing Keyloggers to Windows.☆1,072Updated 2 years ago
- Generate unicode domains for IDN Homograph Attack and detect them.☆1,202Updated 3 years ago
- A PowerShell script anti-virus evasion tool☆1,140Updated 2 years ago
- Module of Metasploit to exploit the vulnerability Eternalblue-Doublepulsar.☆1,122Updated 4 years ago
- Automatically brute force all services running on a target.☆2,094Updated 10 months ago
- Python botnet and backdoor☆1,590Updated 2 years ago
- Phishing Tool & Information Collector☆4,392Updated 7 months ago
- A powerful and useful hacker dictionary builder for a brute-force attack☆3,377Updated 6 months ago
- QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on “Login…☆1,415Updated last year
- Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool)☆869Updated 6 years ago
- Python Remote Administration Tool (RAT) to gain meterpreter session☆617Updated 7 months ago