tanc7 / Hyperjackers-Handbook
A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtrual Machine)
☆14Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hyperjackers-Handbook
- Finder Predator The Thief botnet panel☆7Updated 5 years ago
- Packet sniffer using scapy☆18Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆15Updated 3 years ago
- A Fast & free Windows remote administration tool.☆10Updated 2 years ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆12Updated 4 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- Phishing can't get any easier with Tilapia☆11Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- javascript redirect after installing a google chrome or mozilla firefox extension☆9Updated 4 years ago
- Undetectable Windows Payload Generation☆10Updated 6 years ago
- Various tools i created for my own use☆10Updated 6 years ago
- Tutorials for getting started with Pwntools☆13Updated 2 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Firefox addon for a Man In The Middle detection☆12Updated 4 years ago
- Some useful scripts for CobaltStrike☆10Updated 5 years ago
- Windows Keylogger in C++☆17Updated 2 years ago
- Files related to my training classes☆15Updated 3 years ago
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 3 years ago
- tuorial VanillaRAT☆8Updated 5 years ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago