tanc7 / EasyPeasey
Metasploit/MSFVenom Payload Generator Stand Alone
☆29Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for EasyPeasey
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆25Updated 7 years ago
- pen testing scripts☆9Updated 3 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆30Updated 7 years ago
- python remote access trojan☆32Updated 7 years ago
- ☆19Updated 7 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆13Updated 5 years ago
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆14Updated 4 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 9 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Updated 2 years ago
- Converts a command to a base64 powershell compatible string☆25Updated 10 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆30Updated 7 years ago
- Python script that acts like the original sudo binary to fool users into entering their passwords☆17Updated 8 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- MS17-010☆12Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 3 years ago
- [BASH] Password generator through a wordlist☆12Updated 11 years ago
- Automation Hacking & Penetration Testing Suite☆11Updated 8 years ago
- dDumper is a Drupal Vulnerability Scanner & an Auto Exploiter.☆20Updated 7 months ago
- Software exploitation training material☆15Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Plog - A simple and powerful keylogger !☆11Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- ☆24Updated 8 years ago
- transform your payload.exe into one fake word doc (.ppt)☆8Updated last year
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago