Bare Bones Banking malware coded for research & educational purposes
☆87Aug 24, 2020Updated 5 years ago
Alternatives and similar repositories for Coqui
Users that are interested in Coqui are comparing it to the libraries listed below
Sorting:
- ☆49Jul 14, 2020Updated 5 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆17May 18, 2021Updated 4 years ago
- Code developed to steal certain browser config files (history, preferences, etc)☆63Aug 6, 2020Updated 5 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Python script to compress VBA macro files☆24Feb 2, 2023Updated 3 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- ☆16Apr 14, 2020Updated 5 years ago
- Monitoring tool to detect patterns or IOCs (strings, regex, VirusTotal) and alert you and your team via console, Telegram or SMS written …☆18Feb 17, 2026Updated 2 weeks ago
- Network-based Startup Module Framework (Network Dropper)☆14Dec 11, 2023Updated 2 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 2 years ago
- Post-Auth RCE & Persistence on UOKOO Security Cameras☆12Nov 17, 2020Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- ☆49Dec 21, 2025Updated 2 months ago
- Your eyes on the target - SPY☆25Jul 24, 2020Updated 5 years ago
- all credits go to @mgeeky☆65Oct 14, 2021Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Self-healing RAT utilizing libp2p☆88Dec 27, 2020Updated 5 years ago
- Log converter from CS log to Ghostwriter CSV☆31Nov 23, 2020Updated 5 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 6 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆44Oct 12, 2021Updated 4 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆214Nov 26, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- Test if an antivirus is installed via the resolution of the service virtual SID☆56Jan 24, 2020Updated 6 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Minimal DLL-injection tool.☆37Apr 5, 2016Updated 9 years ago
- A small .NET compression utility☆58Feb 2, 2022Updated 4 years ago
- My Notes from Hugging Face AI Agents Course☆20Feb 18, 2025Updated last year
- Convert Microsoft Defender Antivirus Signatures (VDM) into a SQL DB☆24Jun 27, 2025Updated 8 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆23Aug 6, 2024Updated last year
- Remote Thread Injection by C# + Delegate Techniques☆12Jun 6, 2023Updated 2 years ago
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Nov 18, 2020Updated 5 years ago
- Microsoft Applocker evasion tool☆39Nov 26, 2019Updated 6 years ago
- A recreation of the "Nobelium" malware based on Microsofts Malware analysis - Part 1: PDF2Pwn☆100Mar 8, 2023Updated 2 years ago
- Feature-rich Post Exploitation Framework with Network Pivoting capabilities.☆93May 15, 2021Updated 4 years ago