☆12Nov 21, 2023Updated 2 years ago
Alternatives and similar repositories for PingPlant
Users that are interested in PingPlant are comparing it to the libraries listed below
Sorting:
- Ghidra script which fully parses COFF files☆12Oct 18, 2024Updated last year
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Oct 15, 2021Updated 4 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- Infecting PE☆25Mar 10, 2014Updated 11 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Utility to inject honey tokens into lsass.☆28Feb 7, 2017Updated 9 years ago
- A rust based DLL injection project☆31Sep 18, 2022Updated 3 years ago
- A script that extracts embedded images from Office Open XML (OOXML) documents and generates image hash similarity graphs that cluster vis…☆23Dec 12, 2021Updated 4 years ago
- Tool for profiling heap usage and memory management☆27Oct 31, 2021Updated 4 years ago
- Multi source CVE/exploit parser.☆27Aug 30, 2017Updated 8 years ago
- This tool will listen on a given port, strip SSL encryption, forward traffic through a plain TCP proxy, then encrypt the returning traffi…☆31Oct 18, 2021Updated 4 years ago
- quality of life☆19Dec 24, 2019Updated 6 years ago
- ☆57Mar 25, 2024Updated last year
- A tool capable of bypassing easy root detection mechanisms by patching applications automatically (without frida).☆32Jun 20, 2024Updated last year
- Hacking environment installation scripts for OS X☆28Jan 16, 2022Updated 4 years ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- A Vim syntax highlighting for YARA and YARA-X rules☆31Jan 1, 2026Updated 2 months ago
- A swiss army knife for pentesting networks☆25Sep 3, 2022Updated 3 years ago
- Scripts and tool for iOS app reversing☆27Oct 1, 2021Updated 4 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 4 months ago
- ☆40Aug 25, 2018Updated 7 years ago
- Reverse Engineering and Debugging Malware☆32Feb 27, 2023Updated 3 years ago
- ☆36Jan 11, 2023Updated 3 years ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago
- Simple PoC Python agent to showcase Havoc C2's custom agent interface. Not operationally safe or stable. Released with accompanying blog …☆86Nov 8, 2023Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- My modern disassemblies of paleolithic (DOS-era) malware!☆13Feb 7, 2026Updated 3 weeks ago
- An application that displays a map and graphs showing solar irradiance forecasts in solar farms in Georgia using data from the National S…☆10Oct 15, 2021Updated 4 years ago
- My conference presentations☆87Nov 11, 2025Updated 3 months ago
- ☆84Nov 21, 2024Updated last year
- A prototype malware C2 channel using x509 certificates over mTLS☆152Mar 15, 2024Updated last year
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆150May 3, 2024Updated last year
- An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations☆61Aug 18, 2025Updated 6 months ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Jun 4, 2022Updated 3 years ago
- 👶🏻😿 A zero-dependency network sniffer, written from scratch, that supports emulated and native cBPF. Runs on Linux, BSD, macOS and Win…☆13Nov 8, 2025Updated 3 months ago
- A generic Apigee proxy to give CRUD access to Firestore collections, to AppSheet Applications.☆12Nov 22, 2021Updated 4 years ago