theanonhackuk / pegasus-spyware
☆14Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for pegasus-spyware
- A Hacking and Pentesting Tool for Windows☆18Updated 7 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 3 months ago
- Pentesting Tools to Automatize Active Directory Hacking☆14Updated 2 years ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆19Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- i will upload all the books that helped me in learning in this repo☆20Updated last year
- Simple Python Modular Script to Broke Web Logins☆11Updated 2 years ago
- Malware Libraries focused in help Malware Development☆10Updated last year
- ☆15Updated 2 years ago
- Simple Tool for webhacking☆10Updated last year
- FHook is a Command and Control server which allows an individual to accept connections from multiple remote clients via a remote access t…☆14Updated last year
- Whspdefendor Exploit Framework v1.0☆13Updated last year
- A reverse TCP payload and listener both written in python3.☆32Updated 5 months ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆11Updated last year
- Hax is a mini-tool with really useful hacking tools.☆16Updated last year
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆15Updated last year
- Simple Imager has been created for performing live acquisition of Windows based systems in a forensically sound manner☆31Updated 2 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆32Updated last year
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆11Updated 2 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Updated last year
- An open-source .NET Ransomware☆24Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- HTTP based framework for building command and control components for remote access trojans☆12Updated 3 years ago
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆13Updated last year
- Another vulnerability scanner☆17Updated last year
- ☆22Updated last year