Metasploit/MSFVenom Payload Generator Stand Alone
☆31May 5, 2017Updated 8 years ago
Alternatives and similar repositories for EasyPeasey
Users that are interested in EasyPeasey are comparing it to the libraries listed below
Sorting:
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Apr 15, 2017Updated 8 years ago
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Sep 9, 2021Updated 4 years ago
- ☆13Feb 25, 2023Updated 3 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- legacy Botnets source code Forked from github.com/malwares☆27Jan 30, 2022Updated 4 years ago
- Plog - A simple and powerful keylogger !☆11Jun 28, 2018Updated 7 years ago
- Enumerate all processes and get specified file's handle,then close it.☆12Jul 2, 2018Updated 7 years ago
- Find infected ms17-010 machines☆14May 26, 2017Updated 8 years ago
- advanced Perl Backdoor☆13Jun 6, 2015Updated 10 years ago
- TCP port multiplexer: run multiple services through the same port☆15Sep 21, 2013Updated 12 years ago
- Fake AccessPoint Attack☆31Jul 27, 2018Updated 7 years ago
- Penetration Test / Read Team - C# tools repository☆55Dec 23, 2021Updated 4 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Jun 6, 2015Updated 10 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- a very simple rootkit for fun☆19Nov 6, 2018Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Inforfinder is a tool to collect information of any domains pointing at some server (ip, domain, range, file). Is able to detect all doma…☆68Sep 18, 2024Updated last year
- just manipulatin these here tokens yes sir nothing weird☆22Apr 18, 2022Updated 3 years ago
- Projects and POCs☆61Jul 14, 2014Updated 11 years ago
- Tools for analyzing Windows containers and break container's isolation☆32Aug 2, 2022Updated 3 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- A tool to get root privileges on GNU/Linux, injecting malware early in the boot chain. It also works on systems with root encrypted parti…☆23Dec 25, 2021Updated 4 years ago
- Bash Script to automate the process of setting up a new Kali Linux virtual machine to look a like HTB PwnBox☆21Aug 11, 2022Updated 3 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Nov 7, 2020Updated 5 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- A library that injects into SpringBoard and bruteforce the 4-digit lockscreen pin.☆10Mar 24, 2015Updated 10 years ago
- A wacky exploitation framework written in pure python3.☆23Mar 24, 2024Updated last year
- Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .☆46May 5, 2019Updated 6 years ago
- Gmail Knocker☆23Jul 24, 2017Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)☆25Oct 21, 2017Updated 8 years ago
- EXOCET - AV-evading, undetectable, payload delivery tool☆844Aug 16, 2022Updated 3 years ago
- Diff tool for comparing export tables in PE images☆24Mar 4, 2020Updated 6 years ago
- This is a script manipulating a bug in OSX to escalate any user level process to Root privilege.☆22May 30, 2015Updated 10 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.☆153Oct 20, 2018Updated 7 years ago