spicesouls / onelinepyLinks
Python Obfuscator to generate One-Liners and FUD Payloads.
☆164Updated 4 years ago
Alternatives and similar repositories for onelinepy
Users that are interested in onelinepy are comparing it to the libraries listed below
Sorting:
- Assist reverse tcp shells in post-exploration tasks☆219Updated last month
- A better version of Xencrypt.Xencrypt it self is a Powershell runtime crypter designed to evade AVs.☆225Updated 4 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆179Updated 3 years ago
- Create a fully undetectable backdoor with simple steps.☆76Updated 3 years ago
- Spoof file icons and extensions in Windows☆191Updated last year
- Simple & Customizable DNS Data Exfiltrator☆113Updated 2 years ago
- VySecator Is a Python Script Obfuscation Tool, Which can be used to Obfuscate your hand written Malwares and your Hand Written Scripts!☆73Updated last year
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated 2 years ago
- C2 server to connect to a victim machine via reverse shell☆52Updated 3 years ago
- Meterpreter Reverse shell over TOR network using hidden services☆88Updated 4 years ago
- Undetectable payload for Windows 10 and 11☆40Updated 2 years ago
- CredPhish is a PowerShell script designed to invoke legitimate credential prompts and exfiltrate passwords over DNS.☆291Updated 4 years ago
- ☆265Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆39Updated last year
- .NET Antivirus Evasion Tool (Exe2Bat)☆40Updated 3 years ago
- AV evading cross platform Backdoor and Crypter Framework with a integrated lightweight webUI☆306Updated 3 weeks ago
- Tricks the target into enabling content (macros) with fake messages. Once enabled, uses macros to reduce the risk of suspision from targe…☆173Updated 9 months ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆117Updated 4 years ago
- A proof of concept email spoofing tool built on Docker.☆129Updated 4 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- Phishlets for Evilginx2 (MITM proxy Framework)☆164Updated 5 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Updated 4 years ago
- Medusa is a cross-platform C2 agent compatible with Python 2.7 and 3.8, compatible with Mythic☆200Updated 4 months ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆92Updated 4 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆258Updated 9 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- PowerShell Asynchronous TCP Reverse Shell☆158Updated 2 weeks ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆119Updated 2 years ago