A Metamorphic virus πΊ
β19Feb 1, 2022Updated 4 years ago
Alternatives and similar repositories for death
Users that are interested in death are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains a set of InternalBlue patches for the BCM4375B1 Bluetooth controller, allowing to sniff and inject Zigbee, Mosarβ¦β23Jun 30, 2021Updated 4 years ago
- A simple index for HackTheBox machine along with tagsβ16Jan 8, 2026Updated 2 months ago
- RCE Exploit For Maltrail-v0.53β56Oct 29, 2023Updated 2 years ago
- β33Jun 19, 2021Updated 4 years ago
- Windows library for hooking functions across processes, injecting DLLs into other applications, and more. (Somewhat similar to MS Detoursβ¦β12Apr 2, 2013Updated 12 years ago
- Pipeleek scans CI/CD logs and artifacts to detect leaked secrets and pivot from themβ19Updated this week
- Medusa combo files, Hashcat rules and dictionaries, JRT rulesβ14Oct 20, 2022Updated 3 years ago
- ORDER - A small Python web-app to practice blind SQLi in order byβ21Mar 21, 2021Updated 5 years ago
- The best way to send emails in Go.β12Feb 4, 2021Updated 5 years ago
- An utility to download PDB files associated with a Portable Executable (PE).β15Feb 18, 2025Updated last year
- β15Jun 27, 2024Updated last year
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommendedβ12Aug 31, 2019Updated 6 years ago
- β Retrieve your external IP address via DNSβ16Mar 3, 2023Updated 3 years ago
- Regex patterns for manual application source code reviewβ33Dec 14, 2020Updated 5 years ago
- Deobfuscation of XorStringsNetβ14Nov 5, 2024Updated last year
- A tool programmed to shorten links/mask linksβ11Oct 17, 2021Updated 4 years ago
- Detecting cryptocurrency-related communications in network trafficβ12Apr 5, 2020Updated 5 years ago
- MacroPhantom automates the process of generating XOR+Caesar encrypted shellcode and embedding it into VBA macros for Microsoft Office docβ¦β19Mar 20, 2025Updated last year
- β12Updated this week
- β12Jul 8, 2020Updated 5 years ago
- A pentesting Firefox spy extension - PoCβ10Jun 16, 2016Updated 9 years ago
- Demo repository for running eBPF in GitHub Actionsβ23Mar 27, 2025Updated 11 months ago
- Module PMKIDAttack for WiFi Pineappleβ12Oct 6, 2022Updated 3 years ago
- ARP Exploitation in Pythonβ10Feb 19, 2017Updated 9 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.β11May 17, 2024Updated last year
- vulnerable APIs inspired by https://github.com/mattvaldes/vulnerable-apiβ13Dec 8, 2021Updated 4 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.β11Nov 26, 2022Updated 3 years ago
- Go library to allow native inline hooking in windows at runtimeβ14Feb 7, 2024Updated 2 years ago
- β15Apr 20, 2023Updated 2 years ago
- Explore CVE 2023-30845 automatically across multiple subdomainsβ16Sep 30, 2023Updated 2 years ago
- A collections of methods to sleep on Windows using common and less-so-common techniquesβ13Aug 16, 2024Updated last year
- A Golang CLI for the MITRE ATT&CK Frameworkβ14Apr 28, 2025Updated 10 months ago
- An accurated list of things to test while pentestingβ11Jan 2, 2021Updated 5 years ago
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realmβ18Sep 18, 2024Updated last year
- Python package to encode THREE QR codes into ONE.β11Jun 14, 2022Updated 3 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.β15Jul 6, 2025Updated 8 months ago
- A variety of AV evasion techniques written in C# for practice.β98Apr 19, 2021Updated 4 years ago
- Steganography Reverse Shellβ10Apr 22, 2023Updated 2 years ago
- Experimenting with destructive file attacks in Goβ18May 20, 2019Updated 6 years ago