Cloak can backdoor any python script with some tricks.
☆501May 5, 2019Updated 6 years ago
Alternatives and similar repositories for Cloak
Users that are interested in Cloak are comparing it to the libraries listed below
Sorting:
- A python module for dumping usable proxies.☆163Nov 13, 2019Updated 6 years ago
- Locky generates "really" strong yet easy to remember passwords.☆71May 5, 2019Updated 6 years ago
- Intelligent login bruteforcer.☆909Apr 27, 2023Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆836May 17, 2024Updated last year
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- A friend of SQLmap which will do what you always expected from SQLmap.☆450May 5, 2019Updated 6 years ago
- Nano is a family of PHP web shells which are code golfed for stealth.☆446Feb 18, 2020Updated 6 years ago
- Striker is an offensive information and vulnerability scanner.☆2,318Jun 4, 2023Updated 2 years ago
- Multiplatform payload dropper☆281Aug 17, 2021Updated 4 years ago
- Reconnaissance Swiss Army Knife☆2,015Jan 26, 2021Updated 5 years ago
- Python antivirus evasion tool☆1,450Oct 21, 2023Updated 2 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Crack hashes in seconds.☆1,864Dec 10, 2024Updated last year
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Buffer…☆443Jul 11, 2017Updated 8 years ago
- Improved DOS exploit for wordpress websites (CVE-2018-6389)☆127Oct 1, 2020Updated 5 years ago
- modern javascript parser☆68Aug 17, 2025Updated 6 months ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆948May 8, 2019Updated 6 years ago
- Detect and decode encoded strings, recursively.☆923Sep 16, 2025Updated 5 months ago
- Entropy is a (prototype) WAF driven by maths.☆57May 5, 2019Updated 6 years ago
- A script written lazily for generating cross-platform backdoors on the go :)☆190Oct 16, 2018Updated 7 years ago
- Anti-Automation System☆130Mar 18, 2021Updated 4 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- A payload stager using PowerShell☆183Dec 15, 2019Updated 6 years ago
- This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your sess…☆750Sep 1, 2022Updated 3 years ago
- A Phishing Dropper designed to Pentest.☆276May 15, 2017Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆468Dec 8, 2019Updated 6 years ago
- IP obfuscator made to make a malicious ip a bit cuter☆549Oct 14, 2024Updated last year
- HTML form parser for humans.☆81May 15, 2020Updated 5 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆225May 8, 2021Updated 4 years ago
- HTA encryption tool for RedTeams☆1,422Nov 9, 2022Updated 3 years ago
- Trojanize your payload - WinRAR (SFX) automatization - under Linux distros☆293Feb 28, 2018Updated 8 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)☆339Jul 31, 2024Updated last year
- Blockchain Transactions Investigation Tool☆593Jul 15, 2022Updated 3 years ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Undetectable Windows Payload Generation☆1,607Nov 8, 2022Updated 3 years ago
- Hacking systems with the automation of PasteJacking attacks.☆399Oct 14, 2024Updated last year
- NXcrypt - 'python backdoor' framework☆366Jun 26, 2017Updated 8 years ago