20urc3 / auditor.codes
The most complete code auditing platform with thousands of real-world challenges
☆44Updated this week
Alternatives and similar repositories for auditor.codes
Users that are interested in auditor.codes are comparing it to the libraries listed below
Sorting:
- A small red team course☆37Updated last year
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- ☆59Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- vulnlab.com reaper writeup☆26Updated last year
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- ☆37Updated 2 months ago
- Lena's scripts/code/resources for malware analysis☆26Updated 11 months ago
- Situational Awareness script to identify how and where to run implants☆49Updated 5 months ago
- RDE1 (Rusty Data Exfiltrator) is client and server tool allowing auditor to extract files from DNS and HTTPS protocols written in Rust. �…☆40Updated last month
- Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.☆50Updated last month
- Make an Linux Kernel rootkit visible again.☆51Updated 2 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Aplos an extremely simple fuzzer for Windows binaries.☆68Updated 3 months ago
- IAT Unhooking proof-of-concept☆29Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆111Updated 10 months ago
- ☆22Updated 2 months ago
- Windows Administrator level Implant.☆49Updated 7 months ago
- ☆58Updated 7 months ago
- Source for kiosk.vsim.xyz -- tooling for browser-based, Kiosk mode testing.☆26Updated 11 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 11 months ago
- A simple POC to expose Mythic as a MCP server☆61Updated last month
- A red teaming attack paradigm against AI Agents☆29Updated 2 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- OSED Practice binary☆24Updated last year
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 5 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆16Updated 4 months ago