Screenspy – Capture user screenshots using shortcut file (Bypass SmartScreen/Defender)

Capture user screenshots using shortcut file (Bypass SmartScreen/Defender). Suport Multi-monitor Legal disclaimer:Usage of ScreenSpy for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this programInstall gitRead More

Hmmcookies – Grab Cookies From Firefox, Chrome, Opera Using A Shortcut File (Bypass UAC)

Grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass UAC)Legal disclaimer:Usage of HMMCOOKIES for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this programRead More

GhostShell – Malware Indetectable, With AV Bypass Techniques, Anti-Disassembly, And More

In this malware, are used some techniques to try bypass the AVs, VMs, and Sandboxes, with only porpuse to learning more. I’m not responsible for your actions.Bypass Techniques Anti-DebuggerTo try bypass the Debuggers, I’m using the “IsDebuggerPresent()” of “Windows.h” librarie to checks if a debugger is running. Anti-VM / Anti-Sandbox / Anti-AV Enumerate Process FunctionRead More

EvilApp – Phishing Attack Using An Android App To Grab Session Cookies For Any Website (ByPass 2FA)

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication protection. EvilApp brings as an example the hijacking and injection of cookies for authenticated instagram sessions.Legal disclaimer:Usage of EvilApp for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibilityRead More

PayloadsAllTheThings – A List Of Useful Payloads And Bypass For Web Application Security And Pentest/CTF

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques ! Every section contains the following files, you can use the _template_vuln folder to create a new chapter: README.md – vulnerability description and how to exploit it Intruder – a set of files to giveRead More

DeathRansom – A Ransomware Developed In Python, With Bypass Technics, For Educational Purposes

What is a ransomware?A ransomware is malware that encrypts all your files and shows a ransom request, which tells you to pay a set amount, usually in bitcoins (BTC), in a set time to decrypt your files, or he will delete your files. How it works?First, the script checks if it’s in a sandbox, debugger,Read More

X