I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrates how file extension spoofing can be used to evade detection.
☆84Oct 17, 2024Updated last year
Alternatives and similar repositories for I-Espresso
Users that are interested in I-Espresso are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆17Jan 29, 2025Updated last year
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Oct 17, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆37Dec 3, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆29Oct 17, 2024Updated last year
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆18Oct 19, 2024Updated last year
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆14Mar 2, 2026Updated 3 weeks ago
- PolyCaptcha is a Flask‑based web application that mimics Google’s image ‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 8 months ago
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Mar 9, 2026Updated 2 weeks ago
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆37Feb 4, 2026Updated last month
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆83Apr 12, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆147Jan 12, 2025Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆43Jan 29, 2025Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,541Dec 7, 2025Updated 3 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Pyload RCE with js2py sandbox escape☆17Oct 26, 2024Updated last year
- Torrentpier v2.4.1. CVE-2024-1651. Remote Code Execution (RCE). Exploit.☆14Mar 7, 2024Updated 2 years ago
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Online-Crawler-Wayback-Machine☆27Oct 15, 2024Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆15Apr 25, 2022Updated 3 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆216Oct 19, 2024Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- PDF dropper Red Team Scenairos☆229Jul 31, 2024Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 3 months ago
- Easy peasy file uploads☆33Aug 29, 2025Updated 7 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- GitHub CVE Repository Hunt☆18Jul 23, 2024Updated last year
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Huffman Coding in Shellcode Obfuscation & Dynamic Indirect Syscalls Loader.☆283Apr 6, 2025Updated 11 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- PoC XLL builder in Python/Nim☆50Nov 21, 2022Updated 3 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆16May 6, 2024Updated last year