Remote Command executor
☆83Mar 11, 2023Updated 3 years ago
Alternatives and similar repositories for recmd
Users that are interested in recmd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Quick network scanner library. https://crates.io/crates/qscan☆93Dec 26, 2022Updated 3 years ago
- Corrupted files generator. Random bits flipper.☆29Oct 30, 2023Updated 2 years ago
- ☆38Apr 7, 2023Updated 3 years ago
- Alternative Shellcode Execution Via Callbacks in C# with P/Invoke☆86Feb 26, 2023Updated 3 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Simple Secure Static (HTTPS) File Server with embedded certificate☆48Apr 9, 2023Updated 3 years ago
- Burp extension used to snip any header from all the requests.☆23Nov 12, 2023Updated 2 years ago
- ☆11Dec 7, 2025Updated 5 months ago
- 汇编语言编写Shellcode加载器源代码 https://payloads.online/archivers/2022-02-16/1/☆78Oct 24, 2022Updated 3 years ago
- ☆15May 6, 2023Updated 3 years ago
- Linux anti-debugging and anti-analysis rust library☆337Dec 26, 2022Updated 3 years ago
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆267Dec 6, 2025Updated 5 months ago
- ☆39May 20, 2023Updated 2 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- PoC for Acronis Arbitrary File Read - CVE-2022-45451☆18Dec 20, 2022Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Using fibers to run in-memory code.☆244Oct 19, 2023Updated 2 years ago
- A full analysis report detailing as much as possible of a Malware or a Threat☆31Jan 30, 2026Updated 3 months ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆22Nov 5, 2023Updated 2 years ago
- A dynamic unpacking tool☆153Sep 17, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆16Jun 23, 2024Updated last year
- A third-party Gopher Assassin for the Havoc Framework.☆45Jan 1, 2024Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 3 years ago
- I have documented all of the AMSI patches that I learned till now☆73Nov 4, 2025Updated 6 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Jun 30, 2023Updated 2 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- Go shellcode loader that combines multiple evasion techniques☆387Jun 21, 2023Updated 2 years ago
- ☆48Feb 11, 2023Updated 3 years ago
- Single executable reverse SOCKS5 proxy written in Golang.☆151Apr 1, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- POC about how to prevent windbg break☆15Oct 3, 2022Updated 3 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆476Jul 6, 2024Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Mar 1, 2023Updated 3 years ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆90Nov 23, 2022Updated 3 years ago
- posting example☆15May 11, 2020Updated 5 years ago
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Lightdash文件读取漏洞(CVE-2023-35844)☆20Jun 26, 2023Updated 2 years ago