Stars
real time face swap and one-click video deepfake with only a single image
One place for all the default credentials to assist the Blue/Red teamers identifying devices with default password 🛡️
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
đź’€ Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
Stealing Signatures and Making One Invalid Signature at a Time
macro_pack is a tool by @EmericNasi used to automatize obfuscation and generation of Office documents, VB scripts, shortcuts, and other formats for pentest, demo, and social engineering assessments…
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using scree…
C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike.
Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.
Windows Remote Administration Tool that uses Discord, Telegram and GitHub as C2s
Extract and execute a PE embedded within a PNG file using an LNK file.
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after eve…
The provided Python program, Inject-EXE.py, allows you to combine a malicious executable with a legitimate executable, producing a single output executable. This output executable will contain both…
This is a simulation of attack by Fancy Bear group (APT28) targeting high-ranking government officials Western Asia and Eastern Europe
Reverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after eve…
This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially useful when dealing with PowerShell commands containing character…
🙊 Advanced Rat controllable by a telegram bot with many commands and functions.