yatt-ze / Agent-Tesla-Exploit
Agent Tesla Spyware C2 Exploit [PATCHED]
☆26Updated 6 years ago
Alternatives and similar repositories for Agent-Tesla-Exploit:
Users that are interested in Agent-Tesla-Exploit are comparing it to the libraries listed below
- A Cross Platform multifunctional (Windows/Linux/Mac) RAT.☆15Updated 4 years ago
- Simple class to search and upload files☆26Updated 5 years ago
- Malicious Software SRC Extract☆30Updated 2 years ago
- PowerShell Reverse HTTPs Shell☆26Updated 10 years ago
- Simple way to read wirte delete values from registry☆18Updated 5 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆14Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆35Updated 5 years ago
- pen testing scripts☆9Updated 3 years ago
- ransomware chiffre tous les fichiers,télécharge une image depuis un serveur distant puis change le fond d'ecran après le chiffrement des …☆25Updated 3 years ago
- Remote access trojan created using WinRar with firefox installer and python Reverse Shell embedded.☆28Updated 5 years ago
- Windows Crypter/Decrypter Generator with AES 256 bits key☆28Updated 6 years ago
- Author: Vitali Kremez. [Targets the following POS malware: *POSCardStealer.O *Dexter *Alina *POSmalware *JackPos *BlackPOS] [Function: C…☆22Updated 6 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- transform your payload.exe into one fake word doc (.ppt)☆8Updated last year
- A simple and cross-platform Remote Administration Tool written in Ruby☆16Updated 7 years ago
- Repository of tools used in my blog☆50Updated 9 months ago
- AgentTesla botnet C&C RCE exploit.☆16Updated 5 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆33Updated 5 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 4 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 7 years ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆7Updated 2 years ago
- pure python remote adb scanner + nmap scan module☆21Updated 6 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆32Updated 8 years ago
- using VBS to download and install a powershell malware☆39Updated 5 years ago
- Spider or repeater to find all links.☆13Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Android remote administration client☆10Updated 6 years ago