AnonKryptiQuz / I-EspressoView external linksLinks
I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrates how file extension spoofing can be used to evade detection.
☆83Oct 17, 2024Updated last year
Alternatives and similar repositories for I-Espresso
Users that are interested in I-Espresso are comparing it to the libraries listed below
Sorting:
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Oct 17, 2024Updated last year
- GitIntel is a robust GitHub OSINT tool crafted to reveal concealed insights from GitHub repositories and user profiles. Its capabilities …☆15Jan 29, 2025Updated last year
- ScriptoX is a versatile tool that enables users to create SVG and PDF files with embedded JavaScript code.☆17Oct 17, 2024Updated last year
- This GitHub Pages site serves as a creative demonstration of website defacement, featuring an engaging interface and audio elements. IT i…☆12Sep 25, 2024Updated last year
- CoupDeWeb is an automated web vulnerability scanner designed for security researchers and developers. It scans for potential vulnerable …☆28Oct 17, 2024Updated last year
- ShoDam is a simple and effective bookmarklet designed to extract IP addresses from Shodan search results with a single click.☆17Nov 13, 2024Updated last year
- BeeXSS is a specialized automated tool designed to detect Blind XSS (Cross-Site Scripting) vulnerabilities in web applications.☆36Dec 3, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- TorrentSpyder is a command-line utility designed to retrieve Torrent Download History based on a specified IP address.☆17Oct 19, 2024Updated last year
- Modular Windows toolkit for Chrome history harvesting & red team demos.☆13Jan 31, 2026Updated 2 weeks ago
- PolyCaptcha is a Flask‑based web application that mimics Google’s image‑based reCAPTCHA flow to demonstrate how attackers can use visual …☆10Jul 24, 2025Updated 6 months ago
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- XSSGAI is the first-ever AI-powered XSS (Cross-Site Scripting) payload generator. It leverages machine learning and deep learning to crea…☆35Feb 4, 2026Updated last week
- DeConfigro is a tool that scans WordPress websites for the WordPress Setup Config Vulnerability. If exposed, this page indicates an incom…☆18Updated this week
- Welcome to the 403 and 401 Bypass Techniques and Bug Bounty Tips repository! This repo is a collection of methods and strategies to bypas…☆19Dec 26, 2024Updated last year
- Beacon Object Files (BOF) for Cobalt Strike.☆32Aug 23, 2024Updated last year
- Periodically check hashcat cracking progress and notify of success.☆10Dec 18, 2018Updated 7 years ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 2 months ago
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆41Apr 1, 2025Updated 10 months ago
- C# API for Nidhogg rootkit☆21Apr 25, 2024Updated last year
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types l…☆145Jan 12, 2025Updated last year
- Can run a payload shellcode in-memory by injecting a process. (does not bypass AV).☆16Sep 1, 2025Updated 5 months ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆14Apr 25, 2022Updated 3 years ago
- simple c++ visual studio project that doesn't use the C/C++ runtime☆27May 31, 2018Updated 7 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- A POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification Callbacks in local and re…☆32Aug 23, 2023Updated 2 years ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- This tool leverages the Process Forking technique using the RtlCreateProcessReflection API to clone the lsass.exe process. Once the clone…☆214Oct 19, 2024Updated last year
- best tool for finding SQLi,CRLF,XSS,LFi,OpenRedirect☆1,515Dec 7, 2025Updated 2 months ago
- ☆20Mar 21, 2024Updated last year
- ☆22Jun 21, 2022Updated 3 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js☆81Apr 12, 2025Updated 10 months ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed by…☆17May 6, 2024Updated last year
- ☆17Dec 9, 2023Updated 2 years ago
- Will attempt to retrieve DB details for FastAdmin instances☆69Aug 20, 2024Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42May 31, 2024Updated last year
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Jun 19, 2024Updated last year