Create a private Discord CTI "Dashboard" using various Discord bots It,'s a simple and effective way to stay informed and up-to-date on the latest developments and news in Offensive Security World
☆20Feb 16, 2023Updated 3 years ago
Alternatives and similar repositories for OdinEye
Users that are interested in OdinEye are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Just another Process Injection using Process Hollowing technique.☆18Sep 18, 2023Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Aug 31, 2023Updated 2 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆16Nov 20, 2017Updated 8 years ago
- This is the word list for fuzzing kubernetes.☆15Nov 11, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆13Dec 12, 2022Updated 3 years ago
- RATs library 2003 to present☆15Oct 14, 2023Updated 2 years ago
- XPause : Guaranteed to pause the debuggee☆17Oct 2, 2016Updated 9 years ago
- ☆60Oct 24, 2024Updated last year
- From Dork to Download: Automating Google Dorks with Playwright☆44Mar 1, 2026Updated last month
- A Windows 10 login phishing page for your red team exercises☆15Apr 25, 2021Updated 4 years ago
- Library for shellcode injection☆16Mar 21, 2025Updated last year
- Crystal Palace RDLL loader for Adaptix C2 with Ekko sleep obfuscation, IAT hooking via PICO, and per-section permission restoration☆110Mar 24, 2026Updated 3 weeks ago
- Small Python tool to do DLL Sideloading (and consequently, other DLL attacks).☆57Oct 10, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Sliver extension performing TCP redirection tasks without performing cross-process injection.☆68Jan 14, 2025Updated last year
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago
- A web assembly (WASM) phishing lure generator based on pre-built templates and written in Rust with some GenAI assistance. W.A.L.K. aims …☆102Sep 5, 2024Updated last year
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- Fully automated dev environment setup with dotfiles☆11Apr 7, 2026Updated last week
- It's not just UsnJrnl (USN Journal Records/Change Journal Records) parser.☆23Nov 11, 2018Updated 7 years ago
- Ansible roles to deploy RedELK☆23Feb 15, 2023Updated 3 years ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Proof-of-concept code for understanding the allow-jit entitlement on macOS☆31Feb 19, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Reasonably undetected shellcode stager and executer.☆34May 23, 2025Updated 10 months ago
- ☆54Oct 10, 2023Updated 2 years ago
- PHP 8 Sandbox Escape☆82Feb 28, 2026Updated last month
- CTF Challenge for CSAW Finals 2021☆13Nov 17, 2021Updated 4 years ago
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- AI-powered reverse-engineering of Rosetta (2 for Linux). Disclaimer: due to the user agreement, I will not touch the code. All is done by…☆59Mar 14, 2026Updated last month
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆16Sep 8, 2023Updated 2 years ago
- Una colección de mini apps vulnerables desarrolladas en Python con Flask. Cada vulnerabilidad incluye tanto el código vulnerable como su …☆16May 14, 2025Updated 11 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Windows Thread Pool Injection Havoc Implementation☆34Mar 23, 2024Updated 2 years ago
- Home Lab creation project with Active Directory☆23May 13, 2025Updated 11 months ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- This is a release of the torCT PHP RAT for people willing to research RATs and how they work.☆18Dec 3, 2015Updated 10 years ago
- An RF stack for building exfiltration systems.☆17Oct 24, 2018Updated 7 years ago
- API Hammering with C++20☆51Jul 21, 2022Updated 3 years ago
- Bash and ZSH integration for Impacket☆72Nov 6, 2025Updated 5 months ago