Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on the latest developments and news in Offensive Security World
☆20Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for OdinEye
Users that are interested in OdinEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆16Nov 20, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆97Mar 21, 2026Updated last week
- From Dork to Download: Automating Google Dorks with Playwright☆41Mar 1, 2026Updated 3 weeks ago
- ☆57Apr 19, 2023Updated 2 years ago
- Instagram scraping Discord bot☆18Aug 30, 2023Updated 2 years ago
- This is the word list for fuzzing kubernetes.☆15Nov 11, 2023Updated 2 years ago
- ☆13Dec 12, 2022Updated 3 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- ☆59Oct 24, 2024Updated last year
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Synthetic Faces High Quality - Text2Image (SFHQ-T2I) Dataset. 122,726 curated 1024x1024 synthetic face images☆17Oct 14, 2024Updated last year
- Maltego Transform Partner to Ghunt☆15Jan 10, 2025Updated last year
- ☆12Apr 21, 2025Updated 11 months ago
- Docker API Wrapper over WhatsMyName OSINT Username Enumeration Tool☆17May 16, 2025Updated 10 months ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Just another ntdll unhooking using Parun's Fart technique☆76Feb 15, 2023Updated 3 years ago
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆101Sep 5, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Fully automated dev environment setup with dotfiles☆11Apr 7, 2025Updated 11 months ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- PHP 8 Sandbox Escape☆71Feb 28, 2026Updated last month
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated last month
- Reasonably undetected shellcode stager and executer.☆35May 23, 2025Updated 10 months ago
- An interface server connecting Django's Channels and Discord☆12Feb 14, 2022Updated 4 years ago
- ☆53Oct 10, 2023Updated 2 years ago
- Here we share the NTU datasets to all the researchers who are working on biometrics and forensics field.☆11Jul 2, 2025Updated 8 months ago
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- AI-powered reverse-engineering of Rosetta (2 for Linux). Disclaimer: due to the user agreement, I will not touch the code. All is done by…☆57Mar 14, 2026Updated 2 weeks ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆16Sep 8, 2023Updated 2 years ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 10 months ago
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- Home Lab creation project with Active Directory☆20May 13, 2025Updated 10 months ago