shellcode obfuscater and runner in golang
☆11Aug 13, 2023Updated 2 years ago
Alternatives and similar repositories for icecold
Users that are interested in icecold are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆17Oct 21, 2023Updated 2 years ago
- ☆10Aug 9, 2024Updated last year
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 11 months ago
- ☆13Jan 15, 2026Updated 2 months ago
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- Offensive Linux tool for network attacks. Built from the ground with only C.☆14May 1, 2021Updated 4 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- 12-week Geekwise course on web application security and hardening.☆17Mar 19, 2020Updated 6 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- A LAPS dumper written using the impacket library.☆32May 22, 2023Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Tests your API automatically for common API vulnerabilities. Project is still Work In Progress. PRs are appreciated.☆34Apr 12, 2024Updated last year
- ☆10Nov 19, 2016Updated 9 years ago
- bowing to the AI Overlords.☆31Dec 18, 2024Updated last year
- Writeups for PicoCTF2017 Challenges☆10Apr 16, 2017Updated 8 years ago
- ☆10Jun 11, 2018Updated 7 years ago
- WebEngineering Project☆13Nov 16, 2011Updated 14 years ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- ☆12Feb 20, 2022Updated 4 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- ☆19Jan 19, 2026Updated 2 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Panoptes Endpoint Detection and Response Solution☆43Mar 7, 2026Updated 2 weeks ago
- Scan files for potential threats while leveraging AMSI (Antimalware Scan Interface) and Windows Defender. By isolating malicious content.☆37Jan 2, 2025Updated last year
- Docker-based CTF Platform☆15Jul 22, 2019Updated 6 years ago
- Add a type for paths in Go.☆13Aug 12, 2021Updated 4 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- A P2P network security monitoring system for the Ethereum blockchain.☆15Aug 7, 2024Updated last year
- Secretly record audio and video with chromium based browsers.☆24Feb 14, 2024Updated 2 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Repository of Volatility3 plugins☆22Mar 22, 2023Updated 3 years ago
- A string argument parser that understands quotes and backslashes☆10Jan 24, 2017Updated 9 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- Audiodg.exe DLL hijacking for LPE with reboot-free restart primitive. Executes code as LOCAL SERVICE, escalates to SYSTEM via Scheduled T…☆89Jan 24, 2026Updated last month
- ☆74Jun 17, 2025Updated 9 months ago
- Fast, compact and all-around subdomain enumeration tool written in Rust☆23Feb 14, 2022Updated 4 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- ☆21Apr 2, 2024Updated last year