bin2cConvert binary files to C arrays for easy inclusion with your code.
Stars: ✭ 21 (-76.14%)
fofa viewer一个简单实用的FOFA客户端 By flashine
Stars: ✭ 815 (+826.14%)
bank mitigationsAnti keylogger, anti screen logger... Strategy to protect with hookings or improve your sandbox with spyware detection... - Demo
Stars: ✭ 17 (-80.68%)
REW-sploitEmulate and Dissect MSF and *other* attacks
Stars: ✭ 115 (+30.68%)
CycleTLSSpoof TLS/JA3 fingerprints in GO and Javascript
Stars: ✭ 362 (+311.36%)
EggshelliOS/macOS/Linux Remote Administration Tool
Stars: ✭ 1,286 (+1361.36%)
ClippyTerribad PrivEsc enumeration script for Windows systems
Stars: ✭ 15 (-82.95%)
basgobasgo compiles BASIC-lang to Golang. Then 'go build' can translate code to native executable binary.
Stars: ✭ 31 (-64.77%)
SBDStatic Binary Deployer. Download and deploy *Nix utilities on a compromised system.
Stars: ✭ 23 (-73.86%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-72.73%)
Fwdsh3llForward shell generation framework
Stars: ✭ 62 (-29.55%)
PythonadvancedhttpreverseshellAdvanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.
Stars: ✭ 22 (-75%)
oscp-omnibusA collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-47.73%)
EzpzShellCollection Of Reverse Shell that can easily generate using Python3
Stars: ✭ 46 (-47.73%)
WpforceWordpress Attack Suite
Stars: ✭ 633 (+619.32%)
mOrcmOrc is a post-exploitation framework for macOS written in Bash
Stars: ✭ 16 (-81.82%)
expdevVulnerable software and exploits used for OSCP/OSCE preparation
Stars: ✭ 24 (-72.73%)
BifrostBifrost C2. Open-source post-exploitation using Discord API
Stars: ✭ 37 (-57.95%)
machinescliThis tool provides commandline access for https://www.hackthebox.eu, https://tryhackme.com/ and https://www.vulnhub.com/ machines.
Stars: ✭ 34 (-61.36%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+426.14%)
BLUELAYSearches online paste sites for certain search terms which can indicate a possible data breach.
Stars: ✭ 24 (-72.73%)
binary.com-botScripts for using on Binary.com Bots.
Stars: ✭ 60 (-31.82%)
cargo-binstallBinary installation for rust projects
Stars: ✭ 421 (+378.41%)
exploitsExploits developed by me.
Stars: ✭ 35 (-60.23%)
RevsslA script that automates generation of OpenSSL reverse shells
Stars: ✭ 284 (+222.73%)
bin-version-cliGet the version of a binary in semver format
Stars: ✭ 36 (-59.09%)
xbedumpTool to dump header information or sign original Xbox executables
Stars: ✭ 18 (-79.55%)
Android Upload ServiceEasily upload files (Multipart/Binary/FTP out of the box) in the background with progress notification. Support for persistent upload requests, customizations and custom plugins.
Stars: ✭ 2,593 (+2846.59%)
HatVenomHatVenom is a HatSploit native powerful payload generation tool that provides support for all common platforms and architectures.
Stars: ✭ 84 (-4.55%)
Binary Human Pose EstimationThis code implements a demo of the Binarized Convolutional Landmark Localizers for Human Pose Estimation and Face Alignment with Limited Resources paper by Adrian Bulat and Georgios Tzimiropoulos.
Stars: ✭ 210 (+138.64%)
rpc2socksPost-exploit tool that enables a SOCKS tunnel via a Windows host using an extensible custom RPC proto over SMB through a named pipe.
Stars: ✭ 126 (+43.18%)
BinaryserializerA declarative serialization framework for controlling formatting of data at the byte and bit level using field bindings, converters, and code.
Stars: ✭ 197 (+123.86%)
requests-ip-rotatorA Python library to utilize AWS API Gateway's large IP pool as a proxy to generate pseudo-infinite IPs for web scraping and brute forcing.
Stars: ✭ 323 (+267.05%)
QilingQiling Advanced Binary Emulation Framework
Stars: ✭ 2,816 (+3100%)
k0otkitk0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.
Stars: ✭ 217 (+146.59%)
Raw WasmRaw WebAssembly demos
Stars: ✭ 183 (+107.95%)
CFX-BYPASSBypass it, you won't be Banned when playing cheats 2022
Stars: ✭ 18 (-79.55%)
KarkinosA thorough library database to assist with binary exploitation tasks.
Stars: ✭ 170 (+93.18%)
ETWNetMonv3ETWNetMonv3 is simple C# code for Monitoring TCP Network Connection via ETW & ETWProcessMon/2 is for Monitoring Process/Thread/Memory/Imageloads/TCPIP via ETW + Detection for Remote-Thread-Injection & Payload Detection by VirtualMemAlloc Events (in-memory) etc.
Stars: ✭ 32 (-63.64%)
Cs2cppC# to C++ transpiler (Cs2Cpp) (Powered by Roslyn)
Stars: ✭ 155 (+76.14%)
lightify-binary-protocolDocumentation of the OSRAM Lightify Binary Protocol for communication between Lightify Gateway and applications
Stars: ✭ 26 (-70.45%)
ImpulsiveDLLHijackC# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's.
Stars: ✭ 258 (+193.18%)
xgadgetFast, parallel, cross-variant ROP/JOP gadget search for x86/x64 binaries.
Stars: ✭ 33 (-62.5%)
vulnscanA static binary vulnerability scanner
Stars: ✭ 47 (-46.59%)
Binpp 🔢 Erlang Binary Pretty Printer
Stars: ✭ 148 (+68.18%)
tor-rootkitA Python 3 standalone Windows 10 / Linux Rootkit using Tor.
Stars: ✭ 142 (+61.36%)
ExodusPainless relocation of Linux binaries–and all of their dependencies–without containers.
Stars: ✭ 2,560 (+2809.09%)
BootsyDesigned to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Stars: ✭ 33 (-62.5%)
binaryapiBinary.com & Deriv.com API for Python
Stars: ✭ 32 (-63.64%)
palinka c2Just another useless C2 occupying space in some HDD somewhere.
Stars: ✭ 14 (-84.09%)
OSCESome exploits, which I’ve created during my OSCE preparation.
Stars: ✭ 74 (-15.91%)