Anon-Exploiter / S3miNaLinks
A python based utility to download animes for offline viewing ¯\(ツ)/¯
☆13Updated 4 years ago
Alternatives and similar repositories for S3miNa
Users that are interested in S3miNa are comparing it to the libraries listed below
Sorting:
- Basic tool to automate backdooring PE files☆56Updated 3 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Random code snippets☆11Updated 2 years ago
- Steal users password with a fake sudo function.☆42Updated last year
- Slides from my talk "whoami /priv" at Romhack 2018☆39Updated 7 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆28Updated 8 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- Experimenting with destructive file attacks in Go☆18Updated 6 years ago
- Collection of things made during my SLAE 32-bit journey☆14Updated 3 years ago
- RID Hijacking Proof of Concept script by Kevin Joyce☆15Updated 7 years ago
- Random stuff☆16Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A cross-platform stager for SILENTTRINITY (https://github.com/byt3bl33d3r/SILENTTRINITY)☆26Updated 6 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated last month
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- PoC code from blog☆16Updated 5 years ago
- ☆13Updated 8 years ago
- Commands to perform various activities related to penetration testing and red teaming☆18Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Miscellaneous for various things☆21Updated 11 months ago
- automatic scan for hackthebox☆13Updated 5 years ago
- ☆21Updated 5 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Updated 10 years ago
- ☆18Updated 5 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Updated 7 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 5 years ago