GitHub topics: slient-url-exploit
benedixX0/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2023
Journeying along the chronicle of vulnerability revelation, we unveil a tapestry woven in meticulous detail. A scrutiny, inching ever closer to the core of the Exploit JPG's essence, exposes a web of malevolence—a tale where the ominous link intertwines with the very URL that orchestrates a symphony of download and execution. At the helm of this or
Language: C++ - Size: 652 KB - Last synced at: about 2 years ago - Pushed at: about 2 years ago - Stars: 0 - Forks: 0
Rch881/S-L-E-X
The next step is to host the malicious content that the attacker wishes to “share”. One option is for the attacker to host the malicious content on their own server. However, it’s rather difficult directing users to a new page, so an exposed legal website may also host it. Or even a legal website could be distributing the attackers’ content through
Language: C# - Size: 0 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0
Rch881/S-L-D-C
Vulnerability Disclosure Timeline **Closer inspection of the Exploit PDF content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit PDF from Python encrypted code content which we also implement in couple of our builders.** * Silent PDF Exploit **silent-pdf-exploit-2018silent-pdf-exploit-201
Language: C++ - Size: 0 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0
Rch881/H-T-A
Include silent doc exploit -Several exploits, most are sendable via GMail -Compatible with every rat/keylogger/worm -Compatible with Windows XP - Windows 10 32/64 -FUD (DOC CHM)
Language: C# - Size: 0 Bytes - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0
RcsLWW/Exp-HTML
URL Infection (Silent Java Drive By) URL Infection Exploit Silent Java Drive by downloads may happen when visiting a site, opening an e-mail message. It may even happen by clicking on a malicious pop-up window: by clicking on the window in the belief that it concerns an error report from the computer’s OS, for example.
Language: C# - Size: 1.43 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0
RcsLWW/Exp-Ht
Features: -Include silent doc exploit -Several exploits, most are sendable via GMail -Compatible with every rat/keylogger/worm -Compatible with Windows XP - Windows 10 32/64 -FUD (DOC CHM) -Works with every MS Office from 2007 to 2016 (excluding Starter edition - there's no macro support) -Startup -base64 encode
Language: C# - Size: 2.28 MB - Last synced at: over 2 years ago - Pushed at: over 2 years ago - Stars: 0 - Forks: 0