• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

stealth

  1. itsMe

    fileless-xec v3.1 - A stealth dropper

    Pentest use: fileless-xec is used on the target machine to execute a binary file on an attacker-controlled machine Short story fileless-xec enable us to execute a remote binary on a local machine in one step without dropping them on disk     simple usage fileless-xec <binary_url>    ...
  2. itsMe

    fileless-xec v3.0.0 - A stealth dropper

    fileless-xec – A stealth dropper Pentest use: fileless-xec is used on the target machine to execute a binary file on an attacker-controlled machine Short story fileless-xec enable us to execute a remote binary on a local machine in one step without dropping them on disk     simple usage...
  3. itsMe

    Phpsploit v3.1 - Stealth post-exploitation framework

    PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes. Features     Efficient: More...
  4. itsMe

    ProjectOpal - Stealth Post-Exploitation For Wordpress

    Stealth post-exploitation framework for Wordpress CMS What is it and why was it made? We intentionally made it for our penetration testing jobs however its getting grey hairs now so we thought we would like to pass it on to the public!. ProjectOpal or Opal. Is a stealth post exploit framework...
  5. itsMe

    ProjectOpal: Stealth post-exploitation framework for wordpress

    Opal Stealth post-exploitation framework for WordPress CMS What is it and why was it made? We intentionally made it for our penetration testing jobs however its getting grey hairs now so we thought we would like to pass it on to the public!. ProjectOpal or Opal. It is a stealth post exploit...
  6. dEEpEst

    MorphAES [IDPS & SandBox & AntiVirus STEALTH KILLER]

    MorphAES IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and capability to bypass sandboxes, which makes it undetectable for an IDPS, it's cross-platform as well and library-independent. Properties...
  7. E

    Stealer Stealth Screenshot Saver + Uploader - Take screenshots remotely on other computers

    Stealth Screenshot Saver + Uploader is a combination of windows utilities to create a malicious program without requiring any heavy coding. The executable file contain: file.bat - Batch file contains the screenshot batch line + ftp credentials main.exe - Execute the hidden file.bat...
  8. E

    Stealer Stealth Screenshot Saver + Uploader (RESEARCH)

    This archive is the research for a trojan that takes screenshots from the system and upload to server. All hidden/stealth from the user. Features: 1) Custom server login (IP/Domain, Username, Password) 2) Custom number of screenshots to take 3) Upload to the server by FTP Download...
Back
Top