theaqueen21 / Merlot
A Simple RedLineStealer
☆12Updated last year
Alternatives and similar repositories for Merlot:
Users that are interested in Merlot are comparing it to the libraries listed below
- Simple Tool for webhacking☆11Updated last year
- Generate Undetectable Metasploit Payload in a simple way☆38Updated last year
- PhishLog is a penetration testing and red teaming tool that automates the setup of a live keylogger that could be used with phishing camp…☆30Updated 5 years ago
- A PoC C2 tool utilizing Google Calendar events as a covert channel for communication between attacker and target.☆18Updated last year
- Red Teaming Tactics and Techniques☆14Updated 3 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- Generate FUD Droppers that are undetectable by popular AV's☆31Updated last year
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆16Updated 2 years ago
- An efficient tool To Find click jacking vulnerabilities in easiest way with poc☆22Updated 3 years ago
- Anubis 7.0☆25Updated 6 months ago
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Updated last year
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆25Updated 2 years ago
- Dogma V1.5.3☆28Updated 5 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated 10 months ago
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwarding☆15Updated 4 years ago
- A small tool to find admin panel of the website☆13Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionals☆34Updated 10 months ago
- A Simple Script For SSH BruteForce☆36Updated last year
- Hacking with PasteJacking technique☆21Updated 9 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆9Updated last year
- Automated sqlmap☆20Updated 2 years ago
- A reverse TCP payload and listener both written in python3.☆30Updated 9 months ago
- FULLY UNDETECTABLE POWERSHELL BASED C2 FRAMEWORK☆14Updated last year
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆19Updated 2 years ago
- Usage of WH-HackerExploit (WH-Boomber) Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's re…☆22Updated 4 years ago
- A tool designed to analyse email headers☆33Updated 2 years ago
- Hax is a mini-tool with really useful hacking tools.☆18Updated last year
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 4 years ago
- An automated e-mail OSINT tool☆20Updated 2 years ago