AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities
☆72Sep 9, 2021Updated 4 years ago
Alternatives and similar repositories for dark-lord-obama
Users that are interested in dark-lord-obama are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EXOCET - AV-evading, undetectable, payload delivery tool☆844Aug 16, 2022Updated 3 years ago
- CVE-2021-22005批量验证python脚本☆13Sep 25, 2021Updated 4 years ago
- The Mirai Botnet Source Code in Python☆41Nov 7, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Command Line Interface/Framework for Black Hat CTF Competitors☆10Dec 8, 2022Updated 3 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Jul 26, 2021Updated 4 years ago
- FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns,…☆23Jan 7, 2018Updated 8 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆16Jul 26, 2019Updated 6 years ago
- ☆56Feb 11, 2019Updated 7 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆28Apr 15, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- An ADB-based botnet written in C.☆48May 3, 2022Updated 3 years ago
- Aggressor script that gets the latest commands from CobaltStrikes web site and creates an aggressor script based on tool options.☆22Oct 6, 2021Updated 4 years ago
- extensible exploitation framework shipped on a modular multi-tasking architecture☆82Dec 9, 2022Updated 3 years ago
- An open-source, centralized HTTPS botnet☆46Apr 14, 2020Updated 5 years ago
- jgraphx 4.0.4 build for cs project☆22Oct 23, 2020Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- اداة تقوم بالتخمين على اللوحات والشل اتمنى ان ينال على اعجابكم☆12Sep 8, 2019Updated 6 years ago
- Fully Undetectable Native C++ Remote Access Agent / Botnet.☆93Mar 11, 2020Updated 6 years ago
- Extendable payload obfuscation and delivery framework☆146Nov 4, 2022Updated 3 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- An open-source, centralized HTTPS botnet☆79Apr 11, 2023Updated 2 years ago
- Phish password protected Excel-Files☆107Jan 17, 2024Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scan for and exploit the zerologon vulnerability.☆10Sep 15, 2020Updated 5 years ago
- FOSS Patcher in Batchfile for Windows Users to bypass Windows 11 Restrictions - Unfinished☆15Oct 8, 2023Updated 2 years ago
- ☆10Sep 3, 2021Updated 4 years ago
- 免杀shellcode☆14Sep 8, 2021Updated 4 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago