yatt-ze / MedusaLinks
rshell manager for the game Grey Hack
☆12Updated last year
Alternatives and similar repositories for Medusa
Users that are interested in Medusa are comparing it to the libraries listed below
Sorting:
- PhishX - The Complete Spear Phishing Tool☆14Updated 7 years ago
- Undetectable Windows Payload Generation☆10Updated 8 years ago
- Penetration Testing Tool for Windows 7 => 10☆14Updated 7 years ago
- another pwndb tool with more options☆15Updated 4 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆50Updated 5 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.☆27Updated 7 years ago
- Remote Administration Tool For Windows VB.NET☆11Updated 6 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆15Updated 9 years ago
- Various Crypter Project☆10Updated 11 years ago
- Here i will upload every prynt stealer stub source code and you will discover that is stormkitty 0_0 (I didnt buy anything from prynt whi…☆11Updated 2 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Updated 5 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- Handy script to automate the attack☆22Updated 6 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Updated 6 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆13Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- Payload Dropper with Persistance & Privesc & UAC bypass 🐱👤☆13Updated last year
- Sourcecode of Infostealer.Dexter POS Malware and C&C☆47Updated 9 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Updated 7 years ago
- Disabling Windows Defender & downloading payload☆21Updated 5 years ago
- Simple keylogger written in C# which is ready for modifications.☆14Updated 4 years ago
- SocksSharp provides support for Socks4/4a/5 proxy servers to HttpClient☆12Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Updated 2 years ago
- Two C# RunPE's capable of x86 and x64 injections☆11Updated 7 years ago
- ☆19Updated 2 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆10Updated 2 years ago
- ☆17Updated 7 years ago
- Collection of scripts that I created to make my life easier.☆12Updated 4 years ago
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago