504sarwarerror / 504SARWARERRORLinks
Is grass green, do birds fly, do cats eat bats, do rats shit gnats? A peak inside in corrupted mind
☆51Updated 3 weeks ago
Alternatives and similar repositories for 504SARWARERROR
Users that are interested in 504SARWARERROR are comparing it to the libraries listed below
Sorting:
- A RAG model trained on malware samples, It is designed to generate new malware☆43Updated 3 weeks ago
- evilwaf is a penetration testing tool designed to detect and bypass common Web Application Firewalls (WAFs).☆146Updated 2 weeks ago
- WifiForge is a tool developed by Black Hills InfoSec to help train Pentesters on different Wi-Fi attack vectors and Wireless capabilities…☆384Updated 3 weeks ago
- Modular malware framework to build custom payloads, designed for advanced adversary simulation and malware research☆317Updated last month
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆106Updated 2 years ago
- 🏴☠️ Hacking Guides, Demos and Proof-of-Concepts 🥷☆208Updated 2 months ago
- A blind SQL injection brute forcer☆111Updated 6 months ago
- AI assistant that utilizes GPT language models to interpret and generate cybersecurity payloads 🪄☆276Updated last year
- A repository of credential stealer formats☆232Updated 4 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 3 weeks ago
- The Darknet Market Bible☆104Updated 10 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- A tool to crack WPA2 passphrase with PMKID value without clients or de-authentication☆222Updated 2 years ago
- A curated list of awesome LOLBins, GTFO projects, and similar 'Living Off the Land' security resources.☆200Updated last year
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- A collection of intel and usernames scraped from various cybercrime sources & forums. DarkForums, HackForums, Patched, Cracked, BreachFor…☆31Updated this week
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 6 months ago
- Intelligent Malware that takes screenshots for entire monitors and exfiltrate them through Trusted Channel Slack to the C2 server that's …☆126Updated 7 months ago
- Evil Crow Cable Pro device☆124Updated 3 weeks ago
- ☆16Updated 2 months ago
- Living Off The Land (LOTL) persistent Reverse shell☆102Updated last year
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- Single animated HTML file that teaches the workings of the TCP Handshake.☆25Updated 7 months ago
- Autofill Phishing☆80Updated 2 months ago
- A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Paylo…☆206Updated last week
- Quick scripts I developed to streamline OSCP tasks☆197Updated 4 months ago
- PwnPad is an affordable, hands-on hardware hacking platform built for practical learning. It features a range of challenges that walk use…☆121Updated 4 months ago