Pinned Repositories
Absorber
An advance keylogger that works and also logs special keys.
AndroRAT
AndroRAT | Remote Administrator Tool for Android OS Hacking
Blogs-for-learning-puprose
CredsLeaker
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
CredsStealer
CredsStealer allows an attacker to craft a highly convincing credentials prompt using Windows PromptForCredential, validate it against the DC or localmachine and in turn leak it via an HTTP request.
EvilClippy
A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro analysis tools. Runs on Linux, OSX and Windows.
ghost
Ghost Framework is an Android post exploitation framework that uses an Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
pymail
Send an email via gmail using python
TigerShark
Multi-Tooled Phishing Framework. TigerShark intergrates some of the best (in my opinion), phishing tools and frameworks of various languages in order to suit whatever your deployment needs may be.
XploitSPY
XploitSPY is an Android Monitoring / Spying Tool
usama7628674's Repositories
usama7628674/Absorber
An advance keylogger that works and also logs special keys.
usama7628674/JPGtoMalware
It embeds the executable file or payload inside the jpg file. The method the program uses isn't exactly called one of the steganography methods. For this reason, it does not cause any distortion in the JPG file. The JPG file size and payload do not have to be proportional.The JPG file is displayed normally in any viewing application or web application. It can bypass various security programs such as firewall, antivirus. If the file is examined in detail, it is easier to detect than steganography methods. However, since the payload in the JPG file is encrypted, it cannot be easily decrypted. It also uses the "garbage code insertion/dead-code insertion" method to prevent the payload from being caught by the antivirus at runtime.
usama7628674/backports-rtl8187
rtl8187 + Master Mode + Packet Injection
usama7628674/BouncyGate
HellsGate in Nim, but making sure that all syscalls go through NTDLL.DLL.
usama7628674/colorpicker
A mininal but complete colorpicker desktop app
usama7628674/concealed_code_execution
Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows
usama7628674/email-prediction-asterisks
usama7628674/encryptor
Windows shellcode encoding and encrypting tool
usama7628674/ev
EV: IDS Evasion via Packet Manipulation
usama7628674/ForceAdmin
⚡ Create infinite UAC prompts forcing a user to run as admin ⚡
usama7628674/Heroinn
A cross platform C2/post-exploitation framework.
usama7628674/HintInject
A PoC project for embedding shellcode to Hint/Name Table
usama7628674/hoaxshell
An unconventional Windows reverse shell, currently undetected by Microsoft Defender and various other AV solutions, solely based on http(s) traffic.
usama7628674/Invoke-Evasion
PowerShell Obfuscation and Data Science
usama7628674/lab8
Bone catching game
usama7628674/malicious-pdf
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
usama7628674/MANSPIDER
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
usama7628674/MITM_Intercept
A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
usama7628674/msImpersonate
msImpersonate - User account impersonation written in pure Python3
usama7628674/Pure-Crypter-ADVANCED-INJECTION-TECHNOLOGY-64BIT-32BIT-Anti-Delete
usama7628674/retoolkit
Reverse Engineer's Toolkit
usama7628674/S-500-G2-Rat-Hvnc-Hidden-Broswers-Hidden-Apps-OperaGX-Rat-Remote-Malware
Clone Profile Hidden Desktop Hidden Browsers Hidden Chrome Hidden Chromodo Hidden SlimJet Hidden Sputnik Hidden Awast Browser Hidden UC Browser Hidden Atom Browser Hidden Opera Neon Hidden Firefox Hidden Edge Hidden Brave Hidden Palemoon Hidden Waterfox Hidden Opera Hidden 360 browser Hidden Comodo Dragon Hidden Internet Explorer Hidden Explorer Hidden Powershell Hidden CMD Hidden Outlook Hidden Thunderbird Hidden Foxmail Hidden Password Recovery HVNC/HVNC browsers HRDP/HRDP browsers/Wallets Reverse Proxy UAC Exploit for Windows 11/10 UAC Exploit for Windows 7 Remote Desktop Remote Cam Remote Microphone Remote Regedit Remote Console Silent Execute File Manager (download,zip,unzip) Disable Windows Defender Execute on connection Tasks Recovery All Chrome based Browsers Recovery for All Firefox based Browsers Recovery & Send Logs To Discord Startup/Schedule task Persistence Miner Watch Dog TaskMgr Dog Spam Tools Hrdp Browers Hrdp Chrome Hrdp Firefox Hrdp Opera Hrdp Brave Hrdp Wallets ArmoryQt Coinomi Atomic Exodus Electrum Jaxx S-500 G2 Builder ! Change Assembly Change Exe Icon Change Exe Name Change Filename File Path Group Clients Mutex Multi Ports Supported Anti Debug System Kill Taskmgr Blue Screen Error Watch Dog Uac Exploit on Execution TaskMgr Dog Export as Shell Code Crypter Merged Run PE Obfuscate
usama7628674/SharpEventPersist
Persistence by writing/reading shellcode from Event Log
usama7628674/SharpImpersonation
A User Impersonation tool - via Token or Shellcode injection
usama7628674/Shellby
Small handy tool for crafting shellcodes by hand.
usama7628674/shellpy
Get Shell with elevation
usama7628674/tornado
Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.
usama7628674/WEF
Wi-Fi Exploitation Framework
usama7628674/WindowsSpyBlocker
Block spying and tracking on Windows
usama7628674/XLL_Phishing
XLL Phishing Tradecraft