superzerosec / evilpdf
☆148Updated last year
Alternatives and similar repositories for evilpdf:
Users that are interested in evilpdf are comparing it to the libraries listed below
- This demonstration video shows how we can control the victim's device by sending the innocent-looking PDF file to the target which actual…☆60Updated 3 years ago
- Create a fully undetectable backdoor with simple steps.☆74Updated 3 years ago
- An efficent Script To Generate FUD Persistent Reverse Shell For Red Teaming. Don't Upload Generated Stub On Virustotal☆78Updated last year
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆122Updated last year
- ☆121Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆128Updated 2 years ago
- Jarbou3 is rat tool coded in python with C&C which can accept multiple connections from clients☆25Updated last year
- steal chrome saved passwords "undetectable"☆50Updated 3 years ago
- Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Gh…☆61Updated 4 years ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆69Updated 2 years ago
- Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security resear…☆252Updated 4 years ago
- A framework like a metasploit containg a variety of modules for pentesting or ethical hacking. This repo willl be updated and new modules…☆122Updated 5 months ago
- The purpose of this tool is to test the window10 defender protection and also other antivirus protection.☆93Updated last year
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆92Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆108Updated 4 years ago
- Full Valid Fake Data Generator☆98Updated 7 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- Herramienta de ingeniería social (Creador de puerta trasera con Reverse Shell para Windows/Android) con Ngrok.☆74Updated 2 years ago
- FUD metasploit Persistence RAT☆4Updated 2 years ago
- New Redline Leak☆128Updated 4 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆107Updated 4 months ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆129Updated 9 months ago
- ☆20Updated 2 years ago
- A tool for WI-FI penetration testing that automates your attacking processes.☆29Updated last month
- Exploit Pack contains a full set of 39.000+ exploits, you can be sure that your next pentest will become unstoppable. All operating syste…☆89Updated 3 years ago
- ☆27Updated 2 years ago
- Many Evilginx2 Phishlets Uptodate☆49Updated last year
- A versatile command and control center (CCC) for DDoS Botnet Simulation & Load Generation.☆113Updated last year
- A reverse TCP payload and listener both written in python3.☆30Updated 10 months ago
- The africana-framework is a software designed for network & web hacking by automating as much stuff as possible to detect vulnerabilities…☆32Updated this week