AntiSyphon / BandBCampaignsView external linksLinks
Backdoors & Breaches: Campaigns. These are short guides to help Incident Captains by giving them game ideas based on actual breaches.
☆42Dec 4, 2023Updated 2 years ago
Alternatives and similar repositories for BandBCampaigns
Users that are interested in BandBCampaigns are comparing it to the libraries listed below
Sorting:
- ☆15Feb 5, 2025Updated last year
- shellcode transformation tool for YARA evasion☆50Dec 17, 2025Updated last month
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Jan 15, 2022Updated 4 years ago
- Ip-Recon is a python powerful reconnaissance tool for retrieving ip address information by using Geo.ipfy API, it developed for termux a…☆37Jul 13, 2024Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24May 8, 2022Updated 3 years ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25May 21, 2025Updated 8 months ago
- ☆10Sep 10, 2024Updated last year
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 9 months ago
- Deny list generator for password filters☆26Jul 29, 2024Updated last year
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- HTNotes - Make your Hack The Box notes with Obsidian☆125Mar 10, 2023Updated 2 years ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42May 31, 2024Updated last year
- A decentralized autonomous organization (DAO) starter kit. This DApp allows users to propose governance actions and vote on them using a …☆21Jan 23, 2026Updated 3 weeks ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆14Dec 3, 2022Updated 3 years ago
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆13Apr 19, 2025Updated 9 months ago
- ☆20May 19, 2024Updated last year
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆19Nov 23, 2025Updated 2 months ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- A simple python script to follow stock market papers in your portfolio☆12Jun 29, 2020Updated 5 years ago
- An advanced NFT launchpad starter kit using ERC721A for low-gas batch minting and Merkle Proofs for gas-efficient whitelist verification.☆21Jan 23, 2026Updated 3 weeks ago
- Animapi adalah library scrapper anime streaming dengan sangat cepat dan mudah digunakan.☆19Oct 6, 2025Updated 4 months ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated last week
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 4 months ago
- Linux Wiper & Cryptor Via Base Utils☆10Sep 14, 2024Updated last year
- ☆12Oct 9, 2022Updated 3 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- ☆10Apr 13, 2021Updated 4 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- Vonssy - Code Telegram Channel☆14Dec 7, 2024Updated last year
- ☆13Jul 23, 2025Updated 6 months ago
- ☆11Dec 22, 2022Updated 3 years ago
- A New Exploitation Technique for Visual Studio Projects☆11Nov 5, 2023Updated 2 years ago
- A Rails RESTful API designed to support intuitive habit tracking UX, with secure JWT auth, clear data modeling, and seamless integration …☆10Aug 4, 2025Updated 6 months ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- Hybrid AI is the future of explainable intelligence. This article explores how combining vector search, knowledge graphs, and retrieval-a…☆21Nov 1, 2025Updated 3 months ago
- ☆20Sep 5, 2025Updated 5 months ago