Code developed to steal certain browser config files (history, preferences, etc)
☆63Aug 6, 2020Updated 5 years ago
Alternatives and similar repositories for spybrowse
Users that are interested in spybrowse are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30Jul 5, 2020Updated 5 years ago
- A polyglot payload generator☆244Aug 15, 2022Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- ☆49Jul 14, 2020Updated 5 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆11Jul 6, 2022Updated 3 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- C# Executable with embedded Python that can be used reflectively to run python code on systems without Python installed☆241Aug 12, 2020Updated 5 years ago
- DropEngine provides a malleable framework for creating shellcode runners, allowing operators to choose from a selection of components and…☆212Nov 26, 2020Updated 5 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆120Aug 11, 2020Updated 5 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Bare Bones Banking malware coded for research & educational purposes☆87Aug 24, 2020Updated 5 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine☆56Jun 14, 2021Updated 4 years ago
- C/C++ code obfuscator. Convert your code to a real one.☆12Sep 24, 2023Updated 2 years ago
- A collection of tools adversaries commonly use in an attack.☆15Nov 23, 2024Updated last year
- A tool to find redirection chains in multiple URLs☆78Jan 1, 2025Updated last year
- NOSNEX - Remake of fluxion for nethunter support☆10Jan 27, 2021Updated 5 years ago
- DNCI - Dot Net Code Injector☆148Jan 11, 2021Updated 5 years ago
- ARTi-C2 is a post-exploitation framework used to execute Atomic Red Team test cases with rapid payload deployment and execution capabili…☆178Feb 14, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- PowerShell payload generator☆120Sep 30, 2021Updated 4 years ago
- A debugger / emulator for Ghidra☆14Oct 30, 2019Updated 6 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- DLL Injector as a service that watches the health of the started thread.☆10Feb 3, 2020Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Free Advance encryptor for Anon Cloud☆16Jan 26, 2023Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Inject shellcode to process using Windows NTAPI for bypassing EDRs and Antiviruses☆40Dec 9, 2020Updated 5 years ago
- A Bind Shell Using the Fax Service and a DLL Hijack☆332May 3, 2020Updated 5 years ago
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28May 22, 2017Updated 8 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- A simple script to generate JScript code for calling Win32 API functions using XLM/Excel 4.0 macros via Excel.Application "ExecuteExcel4M…☆91Nov 9, 2019Updated 6 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago