theanonhackuk / pegasus-spywareLinks
☆19Updated 3 years ago
Alternatives and similar repositories for pegasus-spyware
Users that are interested in pegasus-spyware are comparing it to the libraries listed below
Sorting:
- Dimorf is a ransomware using 256-bit AES with a self-destructing, randomly generated key for Linux OS´s☆59Updated 2 years ago
- Well, I have created this shit for educational pruposes (I think)☆38Updated 3 years ago
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- This is a Simple reg Backdoor for Windows shell Hacking. You can fully compromise the target machine with this TOOL . For Advance backdoo…☆15Updated 5 years ago
- Simple Ransoware to attack Windows 🌟☆24Updated 2 years ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- Red Teaming Tactics and Techniques☆13Updated 4 years ago
- Ransomware Simulator for Blue team ,Ransomware Simulator for Red team ,Ransomware infographic, open source Anti Ransomware, Ransomware As…☆35Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆21Updated 3 years ago
- Repository of tools used in my blog☆51Updated last year
- Windows-only Remote Access Tool (RAT) with anti-debugging and anti-sandbox checks. For educational purposes only.☆50Updated 4 years ago
- ☆20Updated 4 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 3 years ago
- Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)☆33Updated 3 years ago
- Koadic C3 COM Command & Control - JScript RAT☆49Updated 8 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- Bypass Windows Defender with py2exe from memory.☆39Updated 4 years ago
- Social Engineering Browser Update Attack.☆59Updated 2 years ago
- An open-source .NET Ransomware☆24Updated 4 years ago
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 3 years ago
- VLAN attacks toolkit☆12Updated 3 years ago
- A shell script that mimics sudo and sends you back the password☆45Updated 3 years ago
- ☆20Updated 2 years ago
- A Hidden and Undetectable Remote Access Tool written in C++ and Server in Python3.☆68Updated 2 years ago
- A collection of tools created for computer security research purposes.☆135Updated last week
- Linux Malware creator to attack Windows System via Reverse Shell with FindWindow Process Code Injection☆19Updated 2 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 3 years ago
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Updated 3 years ago
- ☆32Updated 2 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated 2 years ago