0x050f / death
A Metamorphic virus πΊ
β13Updated 3 years ago
Alternatives and similar repositories for death:
Users that are interested in death are comparing it to the libraries listed below
- ZTE F660 Routers Authentication Bypass Leading to RCE.β17Updated last year
- Deploy multiple instances of Nessus in docker containers easilyβ20Updated 3 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.β23Updated 3 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writteβ¦β27Updated 2 years ago
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a β¦β16Updated 7 months ago
- Slides from my talk at the Adversary Village, Defcon 30β29Updated 2 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152β18Updated 2 years ago
- MalDev & AV-EDR Evasion for Pentestersβ14Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.β33Updated 3 weeks ago
- Simple and efficient file shreddingβ14Updated 5 years ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managersβ22Updated 9 months ago
- Some basic info, resources, and code snippets about windows kernel exploitationβ10Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please β¦β11Updated last year
- β9Updated 4 months ago
- My nim learning experimentsβ11Updated 2 years ago
- β17Updated last year
- nTask is a distributed task management program that allows you to distribute tasks across multiple computers using API communication and β¦β14Updated last month
- A utility to fetch and display dns names from the SSL/TLS cert dataβ13Updated last year
- Enumeration & fingerprint toolβ24Updated last year
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.β14Updated 10 months ago
- This repository provides a comprehensive Digital Footprint Checklist to help individuals manage their online presence and enhance privacyβ¦β12Updated 2 months ago
- ECC Public Key Cryptographyβ36Updated last year
- γπͺγThe hidden hookless backdoorβ12Updated 3 months ago
- Detailed explanation of Windows cryptographic algorithms, with examples and schemes.β18Updated 3 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research teaβ¦β18Updated 3 years ago
- It was developed to speed up the processes of SOC Analysts during analysisβ48Updated last year
- Some good things for EXP-301 courseβ11Updated last year
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whiβ¦β39Updated 7 months ago
- Melee: Tool to Detect Infections in MySQL Instancesβ22Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 4 years ago