Meterpreter Reverse shell over TOR network using hidden services
☆88Sep 23, 2021Updated 4 years ago
Alternatives and similar repositories for Poiana
Users that are interested in Poiana are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- cyber security notes for your consumption.☆14Jul 30, 2024Updated last year
- Heroes of newerth scripting pack☆19Jan 21, 2023Updated 3 years ago
- Spring4Shell (CVE-2022-22965)☆12Apr 7, 2022Updated 4 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆55Aug 31, 2023Updated 2 years ago
- Anonymously Reverse Shell over Tor Network using Hidden services without Portforwarding.☆529Dec 18, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- (Sim)ulate (Ba)zar Loader☆27Nov 15, 2020Updated 5 years ago
- CLI-based 802.11 Rogue (Fake) AP & Hidden AP Spotter☆14Dec 26, 2025Updated 3 months ago
- Scripts I created to pass the OSCP☆22Jul 23, 2021Updated 4 years ago
- A compilation of snort rules for detecting malware traffic.☆16Feb 7, 2021Updated 5 years ago
- ☆29Aug 24, 2025Updated 7 months ago
- Malware Checker Tool generates an HTML report by comparing Hashes, Ip Addresses and URL Addresses through the VirusTotal database.☆36Feb 28, 2022Updated 4 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆12Mar 31, 2021Updated 5 years ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- CSIRT Tooling: Best Practices in Developing, Maintaining and Distributing Open Source Tools☆16Feb 26, 2026Updated last month
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆23May 4, 2024Updated last year
- BlackHeart is a simple python script to generate powershell scripts that demonstrate reverse shell gaining without Microsoft Defender res…☆34Apr 9, 2024Updated 2 years ago
- Tools to bypass flawed SELinux policies using the init_module system call☆59Nov 20, 2023Updated 2 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Oct 8, 2020Updated 5 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- Write-ups of All types Bugs☆21Apr 13, 2022Updated 3 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Materials used by Product Management and Product Marketing☆12Aug 5, 2018Updated 7 years ago
- ☆14Nov 18, 2021Updated 4 years ago
- Get all NetNTLM Hashes via Different zero-click Methodologies from LLMNR Poisoning☆18Mar 16, 2022Updated 4 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆32Mar 2, 2019Updated 7 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated last year
- IoC Feed for security analysts etc.☆13Feb 1, 2023Updated 3 years ago
- Guide For WAF Bypass Techniques☆29Aug 15, 2020Updated 5 years ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Aug 28, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Random things for my own reference☆22Aug 22, 2022Updated 3 years ago
- Custom PowerShell module to setup an Active Directory lab environment to practice penetration testing.☆182Apr 10, 2025Updated 11 months ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 9 months ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- (PoC) Tiny Excel BIFF8 Generator, to Embedded 4.0 Macros in xls files without Excel.☆44Aug 1, 2021Updated 4 years ago
- Utility Library☆20Feb 24, 2023Updated 3 years ago