tanc7 / Hyperjackers-HandbookLinks
A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtrual Machine)
☆15Updated 7 years ago
Alternatives and similar repositories for Hyperjackers-Handbook
Users that are interested in Hyperjackers-Handbook are comparing it to the libraries listed below
Sorting:
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 7 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Generate CIA/NSA style project codenames☆22Updated 7 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- ☆22Updated 5 years ago
- edge --> powerpoint --> remote-file --> shell☆12Updated 6 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- golang program to parse Pastebin for keywords and send them per E-Mail☆34Updated 3 weeks ago
- Packet sniffer using scapy☆22Updated 5 years ago
- C & Shellcode Playground..☆11Updated 7 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 4 years ago
- TaskMgr Volatile Environment LPE☆15Updated 2 months ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- Handy script to automate the attack☆21Updated 5 years ago
- This is the list of all rootkits found so far on github and othersites.☆30Updated 4 years ago
- arp-poison (aka arp spoof) tool☆41Updated 12 years ago
- Hunt and Analyze Tor Onion Sites☆23Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- Port scanning and domain utility.☆30Updated 8 years ago
- fanny.bmp cleaned MALWARE - ONLY FOR ACADEMICAL RESEARCH AND EDUCATIONAL PURPOSES! (incl Metasploit detection Module)☆47Updated 2 months ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 7 years ago
- Repository dedicated to storing a multitude of iOS/macOS/OSX/watchOS crash bugs. Some samples need to be viewed as raw in order to see th…☆41Updated 6 years ago
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆46Updated 9 years ago