BlackSnufkin / OdinEyeView external linksLinks
Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on the latest developments and news in Offensive Security World
☆20Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for OdinEye
Users that are interested in OdinEye are comparing it to the libraries listed below
Sorting:
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆16Nov 20, 2017Updated 8 years ago
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- Windows Thread Pool Injection Havoc Implementation☆33Mar 23, 2024Updated last year
- Windows Signature Thief is a program designed to steal the digital signature of one file and install it on another.☆21Dec 9, 2025Updated 2 months ago
- ☆10Aug 4, 2022Updated 3 years ago
- Ansible Collection☆11Apr 22, 2025Updated 9 months ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆99Sep 5, 2024Updated last year
- Remove the Telegram deleted account members from your destination group☆10Oct 14, 2025Updated 4 months ago
- C# Admin Control Panel Finder For Windows☆46Sep 23, 2019Updated 6 years ago
- ☆44Oct 16, 2023Updated 2 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- ☆46Feb 2, 2025Updated last year
- Sliver agent rewritten in C++☆49Sep 4, 2024Updated last year
- ☆11Aug 25, 2023Updated 2 years ago
- A collection of curated Java Deserialization Exploits☆11May 22, 2018Updated 7 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆16Apr 6, 2020Updated 5 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- memcpy() using SSE2 load/store instrinsics☆10Aug 6, 2015Updated 10 years ago
- ☆13Sep 14, 2022Updated 3 years ago
- Use your vim settings anywhere☆164Oct 27, 2014Updated 11 years ago
- ☆15May 30, 2025Updated 8 months ago
- EVM Emergency wallet drainer☆11Aug 2, 2023Updated 2 years ago
- A network segmentation and egress control testing tool for PCI DSS v4.0 compliance. Automatically discovers network segments, validates i…☆13Aug 15, 2025Updated 6 months ago
- This PowerShell script applies a memory patch to bypass the Antimalware Scan Interface (AMSI), allowing unrestricted execution of PowerSh…☆13Jun 2, 2024Updated last year
- Discord Webhook Cannon is a C# multithreaded, open-source Discord Webhook flooder. It can be used to flood webhooks which are used in mal…☆10Mar 14, 2021Updated 4 years ago
- Chocolatey 'docker' package☆12Jan 21, 2019Updated 7 years ago
- ☆12Feb 23, 2015Updated 10 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A cross-platform, collaborative C2 for red-teaming. Agents are cross-compilable (e.g, you can generate Windows DLLs on Linux), cross-comp…☆24Mar 7, 2025Updated 11 months ago
- Get tweets and save file in JSON format without Twitter API☆11Jan 1, 2019Updated 7 years ago
- Azure Offensive Library☆17Oct 18, 2025Updated 3 months ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Dec 13, 2021Updated 4 years ago
- Artemis Academy capstone project☆10Sep 10, 2022Updated 3 years ago