this is a simple shell that has the ability to bypass defenses
☆13May 24, 2024Updated last year
Alternatives and similar repositories for Shell-Custom
Users that are interested in Shell-Custom are comparing it to the libraries listed below
Sorting:
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- ☆12Feb 28, 2022Updated 4 years ago
- Using the Windows API to mess with Task Manager in GoLANG☆15Sep 7, 2021Updated 4 years ago
- A Python API Client for Gophish☆51Jan 11, 2024Updated 2 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- A tool for bypass certify pinning in Android apps☆25Apr 11, 2020Updated 5 years ago
- Unhook Ntdll.dll, Go & C++.☆33Apr 21, 2025Updated 10 months ago
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10May 20, 2025Updated 9 months ago
- A collection of presentations and other contributions I have made to conferences.☆36Sep 9, 2024Updated last year
- ☆42Dec 22, 2020Updated 5 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- ☆13Jan 17, 2025Updated last year
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- ☆46Nov 5, 2025Updated 3 months ago
- more extensions for https://rpcx.io☆10Apr 11, 2021Updated 4 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- ☆11Jun 8, 2022Updated 3 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 3 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago
- TechTalk: Procesamiento masivo de datos con Go y sync.Pool☆12Jan 28, 2022Updated 4 years ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- USB Rubber Ducky implemented on FeatherS2 boards (e.g. Lolin S2 Pico)☆12Nov 21, 2022Updated 3 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago