pseudo<>psuedo's repositories
android-malware
Collection of android malware samples
awesome-windows-exploitation
A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom
backdoor-apk
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool, the Android SDK, smali, etc. This shell script is provided as-is without warranty of any kind and is intended for educational purposes only.
badusb2-mitm-poc
BadUSB 2.0 USB-HID MiTM POC
bankalarbirligi
slempo Android Bot - bankalarbirligi Sahte Flash Player Zararlı Yazılım Analizi
BetterRAT
Better Remote Access Trojan
Cheatsheets-1
Penetration Testing/Security Cheatsheets
D-RAT
D-RAT SRC Extract
Dshell
Dshell is a network forensic analysis framework.
gmail
A Pythonic interface for Google Mail
Hacking-Tools-Repository
A list of security/hacking tools that have been collected from the internet. Suggestions are welcomed.
Misc-PowerShell
Misc. PowerShell scripts
peepdf
Powerful Python tool to analyze PDF documents
ProbeDroid
A dynamic binary instrumentation kit targeting on Android(Lollipop) 5.0 and above.
PSAttack
A portable console aimed at making pentesting with PowerShell a little easier.
pupy
Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in python. It features a all-in-memory execution guideline and leaves very low footprint. Pupy can communicate using various transports, migrate into processes (reflective injection), load remote python code, python packages and python C-extensions from memory.
pupy-binaries
precompiled templates for pupy
RATDecoders
Python Decoders for Common Remote Access Trojans
routersploit
The Router Exploitation Framework
Scripts-2
Useful Scripts
swiftp
FTP server for your android device.
TrojanCockroach
An Undetectable Trojan Spyware
unicorn
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
VulScritp
内网渗透脚本
Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
XtremeRAT
XtremeRAT SRC Extract