Lists (1)
Sort Name ascending (A-Z)
Stars
smb bruteforce in batch, video: https://www.youtube.com/watch?v=sFcRukVhgCA
3 ways of bypassing admin restrictions/uac
This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the…
This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can help you out in building your own malware and payloads :D
The most powerful 100% Python obfuscator.
L3MON - Remote Android Managment Suite Kali LInux, Ubuntu by EFX Tv
Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32
Tor Browser em sandbox no Firejail e táticas anti-forense e anti-metadados, aniquilando os metadados das bridges usadas que ficam registradas no arquivo ~/Downloads/tor-browser/Browser/TorBrowser/D…
Roteador da rede Tor (TOR VPN com bridges) que roteia todo o tráfego da máquina para a rede Tor, utilizando bridges com o plugin obfs4proxy e configuração no /etc/tor/torrc. Opção com apenas o Tor …
Project for securely and anonymously sharing files over the Tor network and create your own dark web website.
Write operation on a file in UEFI with a debugbreak
A Bash script for scanning the local network to identify machines, retrieve their IP and MAC addresses, and determine the operating system using TTL values. The script prompts the user to enter the…
A web tool for converting BIP39 mnemonic codes
Android and different os payloads easy to modify and inject
List of RAT's For android. To get any support on them contact t.me/efxtv
RubberDucky like payloads for DigiSpark Attiny85
Script for Digispark Attiny85, ATMEGA32U4 to steal passwords, cookies and send to your mail
Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advanced obfuscation and session management, making it ideal for si…
I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrates how file extension spoofing can be used to evade detection.
best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect
Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3
real time face swap and one-click video deepfake with only a single image