ransomwares / THERE-IS-A-CVELinks
Your new favorite tool for pentesting.
☆11Updated 11 months ago
Alternatives and similar repositories for THERE-IS-A-CVE
Users that are interested in THERE-IS-A-CVE are comparing it to the libraries listed below
Sorting:
- Obfuscate the bytes of your payload with an association dictionary☆65Updated last month
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆121Updated 3 months ago
- Polymorphic Command & Control☆85Updated 4 months ago
- SQL injection vulnerability scanner☆27Updated 5 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 9 months ago
- Generate an undetectable PE ( .exe ), which bypasses windows defender / AV☆122Updated 2 months ago
- reNgine-ng is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process vi…☆110Updated this week
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆37Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆72Updated last month
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆132Updated 6 months ago
- A blind SQL injection brute forcer☆110Updated 2 months ago
- Orbital - A Custom CTF Platform☆48Updated last month
- What the name says....☆101Updated 10 months ago
- POC | Steal user WhatsApp information/data☆68Updated 2 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆100Updated last year
- ReflectUnhook - Tool designed to neutralize AV/EDR hooks.☆11Updated 7 months ago
- Embed a payload inside a PNG file☆328Updated 8 months ago
- Shellcode encryptor using a substitution cipher with a randomly generated key.☆131Updated 6 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆191Updated 3 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆114Updated last month
- PDF dropper Red Team Scenairos☆214Updated 11 months ago
- ☆91Updated 3 months ago
- PowerShell Obfuscator☆179Updated last year
- ☆157Updated 4 months ago
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆66Updated 2 months ago
- Finding Missing People, extract information in Dark Web and Surfaceweb Investigation and Human Trafficking Support☆34Updated last year
- macos stealer poc☆118Updated this week
- ☆140Updated last month
- 🔍 PANO: Advanced OSINT investigation platform combining graph visualization, timeline analysis, and AI assistance to uncover hidden conn…☆268Updated 2 months ago
- LazyOwn RedTeam/APT Framework is the first RedTeam Framework with an AI-powered C&C, featuring rootkits to conceal campaigns, undetectabl…☆83Updated 2 weeks ago