tanc7 / Hyperjackers-HandbookLinks
A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtrual Machine)
☆15Updated 7 years ago
Alternatives and similar repositories for Hyperjackers-Handbook
Users that are interested in Hyperjackers-Handbook are comparing it to the libraries listed below
Sorting:
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- Data EXfiltration TestER☆21Updated 5 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆31Updated 6 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Spider or repeater to find all links.☆13Updated 4 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Exploits of different CVE IDs (CVE-2021-37910, CVE-2021-40288, CVE-2021-41435, CVE-2021-41436, CVE-2021-41437, CVE-2021-41441, CVE-2021-4…☆17Updated 2 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Updated 2 years ago
- PoC Dumb Ransomware payload. Any malicious use of this code is strictly prohibited.☆29Updated last month
- Seven different DLL injection techniques in one single project.☆11Updated 5 years ago
- The long shadow to emerge as other Git repositories☆18Updated last year
- Python implementation of the SlowLoris DoS attack.☆24Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.☆13Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 2 years ago
- pen testing scripts☆12Updated 4 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆18Updated 4 years ago
- Tiny keylogger for Win XP/Vista/7/8 with ftp upload.☆15Updated 3 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Some ELF Malwares☆10Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 5 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 9 years ago
- All xxx-arsenal repos in one☆16Updated 6 years ago
- TaskMgr Volatile Environment LPE☆14Updated last month