yatt-ze / MedusaLinks
rshell manager for the game Grey Hack
☆12Updated last year
Alternatives and similar repositories for Medusa
Users that are interested in Medusa are comparing it to the libraries listed below
Sorting:
- PhishX - The Complete Spear Phishing Tool☆14Updated 7 years ago
- Undetectable Windows Payload Generation☆10Updated 8 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Updated 3 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆34Updated 6 years ago
- Various Crypter Project☆10Updated 11 years ago
- TaskMgr Volatile Environment LPE☆16Updated 5 months ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 2 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆15Updated 9 years ago
- Malware Libraries focused in help Malware Development☆26Updated 2 years ago
- inject and run code into arbitrary process (x86 and x64)☆14Updated 4 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Updated 8 months ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 6 years ago
- Exploit for the vulnerability null pointer derefrence to in XWorm RAT☆15Updated 8 months ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Updated 6 years ago
- Bash Script with 4 ways to get persistence in Linux systems WITHOUT root permisions☆17Updated 3 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Updated 3 years ago
- Agent Tesla Spyware C2 Exploit [PATCHED]☆30Updated 7 years ago
- another pwndb tool with more options☆16Updated 4 years ago
- Threat Hijacking Simple Implementation☆17Updated 9 months ago
- Spoof parent process ID☆12Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆13Updated 5 months ago
- DOSrat by Criper98 ~ Un Remote Administrator Tool in ITA per Windows☆11Updated 3 years ago
- Repository of tools used in my blog☆52Updated last year
- Sysprep Volatile Environment LPE (2017)☆15Updated 5 months ago