syrex1013 / UAdmin-PhishletsLinks
UAdmin Phishlets for common sites
☆14Updated 2 years ago
Alternatives and similar repositories for UAdmin-Phishlets
Users that are interested in UAdmin-Phishlets are comparing it to the libraries listed below
Sorting:
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆11Updated 4 months ago
- A simple script to obfuscate batch(bat) code easily☆24Updated last year
- Diamond Sorter is a AIO - Stealer Log Utility for checking, sorting, and cleaning Combolists, Stealer Log Cookies, Autofill Text data and…☆36Updated last year
- Zeus-Grabber (GUI) Reverse IP, IP Generator, Google Search Dork & SQli, Zone-H☆39Updated 7 months ago
- Pandora is an simple undetectable open-source virus composed of agents, servers and masters. Can be used under Windows & Linux.☆63Updated 3 years ago
- 1/ An0nymousF0x-V4 2/ DorkBull 3/ JEX_V5 4/ JaguarV3 5/ Mass Bing Grab sites 6/ NekoBot 7/ PayloadV3 8/ Raiz0w0rm 9/ Vipe…☆40Updated 3 years ago
- Go keylogger for Windows, logging keyboard input to a file using Windows API functions, and it is released under the Unlicense.☆25Updated last month
- Crypter/Stub/Downloader for payloads and malware, bypassing all AV and achiving a score of 0/60 detections on virus total☆9Updated last year
- This is a working variant of the Mirai IOT botnet☆13Updated 2 years ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆37Updated last year
- Tool to parse Stealer Logs.☆16Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whic…☆42Updated 2 years ago
- A simple and efficent script to obfuscate python payloads to make it completely FUD☆36Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆18Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆22Updated 2 years ago
- fully Undetectable payload generator for metasploit☆11Updated 2 years ago
- This Python app allows users to inject malicious payloads into PDF files through a GUI. It supports three injection methods: URL, file, a…☆25Updated 2 years ago
- Source Code for BlueEagle jRAT & Release ☄ 📏☣✒Blue Eagle jRAT is a cross platform RAT tool (java RAT) / (jRAT) which is { [Windows RAT]…☆1Updated 2 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆61Updated 3 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆12Updated 2 years ago
- OpenSSH 9.1 vulnerability mass scan and exploit☆8Updated 2 years ago
- Fully undetectable bypass for every antivirus (FUD at the moment). Works by downloading a bat file that adds an exclusion for exe files, …☆35Updated 2 years ago
- This tool can generate various types of dropper to hide your main payload☆7Updated 2 years ago
- MASS SMTP VALID INVALID CHECKER.☆18Updated 7 months ago
- Official leak of source code titan stealer (whole). Includes server + client parts and admin panel. Written in C# (.NET) with library au…☆19Updated last year
- Simple Tool for webhacking☆11Updated 2 years ago
- Complete Botnet Infrastucture with Malicious C&C Server And Malware Agents to infect Windows OS☆53Updated 2 years ago
- Using bitsadmin to download our malware and to bypass defender☆27Updated 4 years ago