sivazozo / hidden-cryLinks
Windows Crypter/Decrypter Generator with AES 256 bits key
☆29Updated 6 years ago
Alternatives and similar repositories for hidden-cry
Users that are interested in hidden-cry are comparing it to the libraries listed below
Sorting:
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- 🔅 Reverse shell written on python3☆15Updated 4 years ago
- Fud Persistent Windows Backdoor developed purely in python☆29Updated 4 years ago
- Passwordless RDP Session Hijacking☆68Updated 3 years ago
- Web App Pen Tester (Web Interface)☆31Updated 2 years ago
- Some stealers in one. Simple to use.☆6Updated 4 years ago
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Repository of tools used in my blog☆51Updated last year
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆16Updated 4 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 4 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 4 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- A PERSISTENT FUD Backdoor ReverseShell coded in C for any Windows distro, that will make itself persistent on every BOOT and fire a dec…☆32Updated 6 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Updated 7 years ago
- cross-platform C2 framework in python 2☆41Updated 3 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last year
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- WH-Encryptor Android + Windows with Extra tools and Features | antivirus Bypass 99% | wh-Cyberspace☆28Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆24Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆16Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- NooB PyThon Matasploit Av Bypasser By Ali khan☆8Updated 4 years ago