samdenty / MirumXLinks
A complex framework that unifies & simplifies the creation of Batch File interfaces.
☆9Updated 7 years ago
Alternatives and similar repositories for MirumX
Users that are interested in MirumX are comparing it to the libraries listed below
Sorting:
- xCMDx monitors the clipboard for commands and prompts to execute when received.☆12Updated 7 years ago
- Pixel-perfect replica of Windows 10, simulated in the browser with Vanilla JS.☆17Updated 7 years ago
- Lightweight remote administrative client written in Java.☆72Updated 5 years ago
- Masking the Sethc.exe backdoor with an anti-detection system.☆29Updated 7 years ago
- A geolocation script for Omegle, Chatroulette and the like☆14Updated 7 years ago
- A ctypes powered python keylogger.☆106Updated 5 years ago
- Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.☆32Updated 8 years ago
- This is a plugin for the c# R.A.T Server providing extension to javascript based browser botnets☆26Updated 7 years ago
- An HTML/Javascript Silent Miner... Simple html page I made that contains the famous Monero Miner Coin Hive, the miner start without user …☆52Updated last year
- ☆26Updated 5 years ago
- Binds two files together and updates the stub accordingly. The stub will then drop and execute both files.☆15Updated 9 years ago
- Mass Windows credential stealer payload for the BashBunny☆14Updated 7 years ago
- 🐂 Modular web based pentesting interface. Designed to run on Pi devices!☆70Updated 6 years ago
- Powershell Framework to make an USB auto-executable on infected machines.☆35Updated 8 years ago
- For when you want a computer to be done - without admin!☆305Updated 7 years ago
- Dumps all chrome passwords to an accounts folder where the program is executed.☆16Updated 5 years ago
- All the Malduinos!☆213Updated 3 years ago
- Fileless Ransomware Example☆36Updated 8 years ago
- 🐍 Copy passwords from Crome and send them via email,Python && win32crypt☆40Updated 9 years ago
- 🍓 🤥🍍If threats like wifi pineapple attacks or karma attacks are active around, users will be informed about these threats. Like proxy☆26Updated 7 years ago
- Fully functional Windows UAC bypass for Hak5 USB rubber ducky.☆27Updated 10 years ago
- Better Remote Access Trojan☆50Updated 8 years ago
- Backdoor en powershell vía Telegram☆30Updated 8 years ago
- Archive of leaked Equation Group materials☆15Updated 8 years ago
- A toolkit for the USB Rubber ducky. Featuring an emulator, code validator & encoder.☆49Updated 8 years ago
- Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.☆22Updated 9 years ago
- Curated archive of tools from the Wikileaks CIA hacking tool leak, pull requests welcome https://wikileaks.org/ciav7p1/☆126Updated 8 years ago
- 👁🗨 This script will simulate fake processes of analysis sandbox/VM software that some malware will try to avoid.☆141Updated last month
- A Python program that scans RAM.☆39Updated 10 years ago
- Simple protector to show how to run a payload without dropping it using RunPE Technique☆35Updated 8 years ago