sterling0x1 / CIA-Hacking-ToolsLinks
WikiLeaks Vault 7 CIA Hacking Tools
☆48Updated 7 years ago
Alternatives and similar repositories for CIA-Hacking-Tools
Users that are interested in CIA-Hacking-Tools are comparing it to the libraries listed below
Sorting:
- ☆68Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 6 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆101Updated last year
- ☆122Updated last year
- ☆85Updated 2 years ago
- DNS over HTTPS targeted malware (only runs once)☆98Updated last year
- Documents Exfiltration project for fun and educational purposes☆145Updated last year
- JustEvadeBro, a cheat sheet which will aid you through AMSI/AV evasion & bypasses.☆308Updated 10 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆68Updated 2 months ago
- Persistent Powershell backdoor tool {😈}☆119Updated 10 months ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆97Updated 2 months ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆12Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆134Updated 3 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆78Updated 2 years ago
- A basic c2 / agent.☆119Updated 5 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆187Updated 3 months ago
- Windows reverse shell GUI☆101Updated 3 years ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- Undetectable payload for Windows 10 and 11☆39Updated 2 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- Joomla! < 4.2.8 - Unauthenticated information disclosure☆87Updated last year
- My collection of malware dev links☆275Updated 2 weeks ago
- Collection of extra pentest tools for Kali Linux☆107Updated 2 years ago
- A Python 3 standalone Windows 10 / Linux Rootkit using Tor.☆182Updated 2 years ago
- Evade the boys in blue and acquire a reverse shell using powercat v2.0☆57Updated 2 years ago
- This repo basically contains the code that was mentioned in the blogposts that was written by me at:☆95Updated 2 years ago
- ☆103Updated 9 months ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆113Updated last year
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆379Updated 10 months ago