sterling0x1 / CIA-Hacking-Tools
WikiLeaks Vault 7 CIA Hacking Tools
☆43Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for CIA-Hacking-Tools
- ☆65Updated 3 years ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆159Updated 8 months ago
- ☆115Updated 7 months ago
- Hades Basic Command & Control Server☆84Updated 11 months ago
- ☆82Updated 2 years ago
- PowerJoker is a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Each Execution.☆35Updated 6 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆64Updated 11 months ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆115Updated last year
- Create a fully undetectable backdoor with simple steps.☆73Updated 2 years ago
- Malware vulnerability intel tool for third-party attackers☆113Updated 2 weeks ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Updated last year
- A C2 framework built for my bachelors thesis☆53Updated last week
- A proof of concept email spoofing tool built on Docker.☆117Updated 3 years ago
- Cross-platform post-exploitation HTTP Command & Control agent written in golang☆88Updated 3 weeks ago
- A collection of Cobalt Strike Aggressor scripts.☆84Updated 2 years ago
- Golang Ransomware☆36Updated 3 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆222Updated 3 years ago
- My collection of malware dev links☆242Updated 2 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆93Updated 9 months ago
- The Havoc Framework☆51Updated 2 years ago
- ☆124Updated last year
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆82Updated 9 months ago
- A project for building Linux && IoT Malware for fun and no-profit☆16Updated 3 months ago
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆52Updated 3 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆118Updated 2 years ago
- Red Teaming tools and techniques☆47Updated last year
- Python based c2 server with a basic beacon server to route the traffic from dummy server to prevent attacker's ip from getting exposed☆25Updated 5 years ago