Pegasus System has been designed by an experienced team of software developers (terkoding) and exploit writers to automate processes so penetration testers can focus on what's really important
☆16Jan 2, 2019Updated 7 years ago
Alternatives and similar repositories for pegasus-system
Users that are interested in pegasus-system are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of Windows, Website and Wifi pentesting scripts and exploits.☆16Nov 9, 2021Updated 4 years ago
- An attack tool designed to remotely disable CCTV camera streams.☆14Nov 9, 2021Updated 4 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 8 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- For educational purpose only.There is a collection of 500+ rats here. Remote-administration-tools-archive.analyze them in a insolated env…☆32Nov 13, 2025Updated 5 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Optional plugins for MITMf☆17Dec 16, 2014Updated 11 years ago
- .Santet online santet-online Features : 1.netcat payload 2.fb group hijacking 3.sms-bomber 4.sms-spoof 5.dos attack Installation : $ apt …☆10Jan 1, 2021Updated 5 years ago
- Pegasus Loki Rat is Whatsapp RAT, it integrates new modules, like recording , lockscreen , and locate options. Pegasus Loki RAT is a Pyth…☆34Jul 6, 2024Updated last year
- This is a collection of Viruses and Worms for Malware Researchers it forms a good backbone from malware back in the day to some recent on…☆11Aug 26, 2014Updated 11 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- automates exploits using ROP chains, using ntdll-scraper☆16May 26, 2022Updated 3 years ago
- Bruteforce any gmail account with a wordlist or EMAIL:PASSWORD List!☆28Dec 25, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Active Directory information dumper via LDAP☆13Mar 5, 2020Updated 6 years ago
- Grants "WRITE_SECURE_SETTINGS" permission to Fluid Navigation Gestures☆19Feb 22, 2019Updated 7 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- Pegasus One is a hacker tools installer and hacking package manager.☆138Jul 22, 2022Updated 3 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- Nexus of Android banking Trojans☆16Oct 11, 2023Updated 2 years ago
- ACSAC 2018 paper: Towards Automated Generation of Exploitation Primitives for Web Browsers☆15Nov 28, 2018Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Trying for all arch detour stuff now☆11Feb 10, 2017Updated 9 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- ☆12Jun 14, 2017Updated 8 years ago
- Dynamic binary analysis via platform emulation☆12Aug 10, 2018Updated 7 years ago
- An attempt at a framework to automate metasploit by making the machine learning modules as plug and play packages. Alpha software and sti…☆13Jan 31, 2019Updated 7 years ago
- Capstone Engine bindings on PHP 7.0+☆12Sep 22, 2022Updated 3 years ago
- Rust binding for Keystone assembler framework☆11Dec 9, 2018Updated 7 years ago
- Super simple Unicorn based CLI arm64 emulator☆11Nov 11, 2020Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆20Jul 4, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆16Jan 27, 2019Updated 7 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking…☆11Aug 23, 2020Updated 5 years ago
- ☆14May 9, 2017Updated 8 years ago
- Shellcode tracer☆15Jun 12, 2016Updated 9 years ago
- Toy approach to VMProtect virtualization☆16Oct 26, 2018Updated 7 years ago
- ☆14Feb 14, 2018Updated 8 years ago