This application assists in managing attack infrastructure for penetration testers by providing an interface to rapidly deploy, manage, and take down various...
Not only can it bind two exes (Windows only), but this program also obfuscates ths two exes. Its output file is usually...
A post-exploitation tool capable of maintaining persistence on a compromised machine, subverting many common host event logs (both network and account logon)...
2FAssassin will automate the exploitations against the common vulnerabilities that lead to the private key leakage. It can be used to compromise...
Run PowerShell with dlls only. Does not require access to powershell.exe as it uses powershell automation dlls. dll mode: Usage: rundll32 PowerShdll,main...
MorphAES is the world’s first polymorphic shellcode/malware engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an...
A filename extension is very important in the Windows operating system and it appears at the end of the file name. Not...
This post is based on how to bypass Anti-Virus by using FUD (Fully Undetectable). There are many Crypters and binders but manually...