0x050f / deathLinks
A Metamorphic virus πΊ
β14Updated 3 years ago
Alternatives and similar repositories for death
Users that are interested in death are comparing it to the libraries listed below
Sorting:
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated last year
- CVE-2023-38831 winrar exploit generator and get reverse shellβ11Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a β¦β16Updated 10 months ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacyβ¦β14Updated 6 months ago
- Rust Weaponization for Red Team Engagements.β11Updated 2 years ago
- My nim learning experimentsβ11Updated 2 years ago
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It providesβ¦β13Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requestsβ12Updated last year
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.β13Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 5 years ago
- Configurable, Community driven, HTTP C2 Profileβ22Updated 3 weeks ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaksβ26Updated last year
- Python support package to parse IP and host inputs from network based toolingβ12Updated last year
- A cyber security oriented interpreted programming language designed to make your experience with cyber security (offensive and defensive)β¦β17Updated last year
- MalDev & AV-EDR Evasion for Pentestersβ15Updated 2 years ago
- β10Updated 2 months ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps β¦β24Updated 2 years ago
- ECC Public Key Cryptographyβ38Updated last year
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please β¦β12Updated 2 years ago
- β14Updated last year
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people hβ¦β12Updated 3 years ago
- PoC MSI payload based on ASEC/AhnLab's blog postβ23Updated 2 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managersβ22Updated last year
- Simple and efficient file shreddingβ14Updated 5 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office docβ¦β12Updated 3 months ago
- β12Updated 3 years ago
- β19Updated last year
- Some good things for EXP-301 courseβ12Updated last year