A multi web security purposes tool
☆47Mar 31, 2026Updated last week
Alternatives and similar repositories for WRock
Users that are interested in WRock are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Hacking with PasteJacking technique☆22Jul 2, 2024Updated last year
- Projected developed for fun only that simulates APT 29 and Lockbit TTPs, showcasing phishing, ISO execution, and DLL proxying for persist…☆62May 3, 2024Updated last year
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆23Nov 20, 2022Updated 3 years ago
- Generate FUD backdoors☆263Mar 17, 2023Updated 3 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- IAT Unhooking proof-of-concept☆34Apr 7, 2024Updated 2 years ago
- Malicious powershell scripts loader designed to avoid detection.☆60Jun 16, 2023Updated 2 years ago
- ☆12Oct 31, 2022Updated 3 years ago
- The SteaLinG is an open-source penetration testing framework designed for social engineering☆243Jul 3, 2024Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆62Aug 18, 2025Updated 7 months ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- Scripts for solving WebSecurity Academy labs of PortSwigger using Python☆100Aug 28, 2025Updated 7 months ago
- Lightweight reflection scanner☆20Aug 31, 2025Updated 7 months ago
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- This repo contains the slides of the y redteaming sessions on my Youtube channel.☆21Dec 9, 2021Updated 4 years ago
- Egyscan The Best web vulnerability scanner; it's a multifaceted security powerhouse designed to fortify your web applications against mal…☆303Mar 26, 2026Updated 2 weeks ago
- Detection for CVE-2025-61882 & CVE-2025-61884☆36Oct 14, 2025Updated 5 months ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- Bug Bounty Platforms☆26Oct 17, 2024Updated last year
- steal chrome saved passwords "undetectable"☆51Mar 15, 2022Updated 4 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Sep 29, 2025Updated 6 months ago
- PoC of CVE-2022-24707☆13May 3, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆117Jul 18, 2023Updated 2 years ago
- ☆42May 20, 2021Updated 4 years ago
- ☆15Jan 8, 2020Updated 6 years ago
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- 40,000+ Nuclei templates for security scanning and detection across diverse web applications and services☆344Jan 7, 2024Updated 2 years ago
- ☆18Nov 25, 2025Updated 4 months ago
- A powerful shell script for creating custom WSL (Windows Subsystem for Linux) distributions with embedded payloads.☆72Nov 16, 2025Updated 4 months ago
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- (Hacking-Tool), All tools in one!☆13Jul 5, 2021Updated 4 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Jul 2, 2020Updated 5 years ago
- A flexible internet crawler used for scanning technologies, instances and vulnerabilities worldwide across the internet.☆19Mar 26, 2025Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆118Mar 25, 2023Updated 3 years ago
- Remote persistent keylogger for Windows and Linux..☆12Aug 21, 2022Updated 3 years ago
- Red Team tool for exfiltrating files from a target's Google Drive that you have access to, via Google's API.☆59Sep 2, 2021Updated 4 years ago