Giter VIP home page Giter VIP logo

cyb1l's Projects

slackor icon slackor

A Golang implant that uses Slack as a command and control server

smbmap icon smbmap

SMBMap is a handy SMB enumeration tool

social_x icon social_x

"Socialx" is a Social Engineering And Remote Access Trojan Tool. You can generate fud backdoor and you can embed any file you want inside of the exe file.

starkiller icon starkiller

Starkiller is a Frontend for PowerShell Empire.

stitch icon stitch

Python Remote Administration Tool (RAT)

superlink icon superlink

Social engineering tool for multiple purposes such as locating target's location, webcam access, OS Password grabber...

swap_digger icon swap_digger

swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.

syn-file icon syn-file

Exfiltrate data from a compromised target using covert channels

teardroid-phprat icon teardroid-phprat

:india: :robot: It's easy to use android botnet work without port forwarding, vps and android studio

timeshifter icon timeshifter

Transmissions over time based covert channels across a network. Modifies the time intervals between packets to transmit data.

torat icon torat

ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication

torghost icon torghost

TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.

vegile icon vegile

This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell

venom icon venom

venom - C2 shellcode generator/compiler/handler

viper icon viper

Viper (炫彩蛇) 开源图形化内网渗透工具

vulnerability icon vulnerability

此项目将不定期从棱角社区对外进行公布一些最新漏洞。

vuls icon vuls

Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.