r0jahsm0ntar1 / africana-framework
The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities on most common services and web technologies. It also has some wide range of penetration testing from internal network, Wi-Fi, system anonymity to web bug hunting. It's purely written for Good and not Evil.
☆27Updated last month
Alternatives and similar repositories for africana-framework:
Users that are interested in africana-framework are comparing it to the libraries listed below
- Social Engineering Browser Update Attack.☆53Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- This is for Ethical Use only!☆19Updated this week
- The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single…☆29Updated 6 months ago
- Here are +200 different rats some with source code☆83Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆122Updated 2 years ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆57Updated 3 years ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆63Updated this week
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆68Updated last year
- Android malware (.apk) can be spread through a fake PDF document by manipulating the file extension in the WhatsApp application. PoC is a…☆134Updated 5 months ago
- Hacking with PasteJacking technique☆19Updated 6 months ago
- This is a exploit with the capability to control ip camera movement even without a username and password.☆54Updated 4 months ago
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆32Updated 5 months ago
- VICIdial Unauthenticated SQLi to RCE Exploit (CVE-2024-8503 and CVE-2024-8504)☆39Updated 4 months ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆73Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆20Updated 2 years ago
- Clipboard poisoning attack.☆55Updated 4 years ago
- QRLJacking A New Form of qr code phishing☆85Updated last month
- steal chrome saved passwords "undetectable"☆50Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆58Updated 9 months ago
- CROSS PLATFORM REMOTE ACCESS TROJAN (RAT)☆100Updated last year
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆34Updated last year
- Boost website hits by generating requests from multiple proxy IPs.☆52Updated 10 months ago
- A C2 framework built for my bachelors thesis☆55Updated 2 months ago
- Redirect All Traffic Through Tor Network For Kali Linux☆158Updated 6 months ago
- ☆21Updated last year
- Simple Powershell Http shell With WEB UI☆70Updated last month
- POC Pdf-exploit builder on C#☆129Updated 10 months ago
- Mass bruteforce authentication of network protocols☆45Updated last year