π¦ Anti-detect browser
β84Mar 16, 2026Updated this week
Alternatives and similar repositories for camoufox
Users that are interested in camoufox are comparing it to the libraries listed below
Sorting:
- Self-deployed Straight-forward hacking lab machine which designed for new comer who want to learn Penetration Testing field that running β¦β16Jul 23, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority threadβ32Sep 24, 2025Updated 5 months ago
- β11Dec 8, 2023Updated 2 years ago
- Simple reverse ICMP shellβ14Apr 30, 2024Updated last year
- Small utility script to notify via Slack about Hashcat's progress during a password cracking sessionβ10Mar 10, 2019Updated 7 years ago
- β17Jan 9, 2025Updated last year
- Offensive Assembly code snippets.β13Jul 12, 2023Updated 2 years ago
- .NET wrapper around LogonUserA to test credsβ12Jun 2, 2022Updated 3 years ago
- A New Exploitation Technique for Visual Studio Projectsβ11Nov 5, 2023Updated 2 years ago
- β18Aug 31, 2023Updated 2 years ago
- top usernames from azure survey 2025β15Apr 25, 2025Updated 10 months ago
- A custom SentinelOne USB scanner.β19Mar 26, 2022Updated 3 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024β11Apr 28, 2024Updated last year
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.β11Nov 24, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerabilityβ10Oct 29, 2023Updated 2 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handlingβ11Oct 25, 2023Updated 2 years ago
- BYOVD hunter to help prioritize windows drivers worth manual analysisβ125Aug 19, 2025Updated 7 months ago
- CyberShield 2025 Intro to EDR Evasion Classβ16Jun 3, 2025Updated 9 months ago
- A collection of sample code used in some experiments with Sliver C2β16Mar 28, 2023Updated 2 years ago
- PHP 8 Sandbox Escapeβ68Feb 28, 2026Updated 2 weeks ago
- various methods of making API callsβ19Feb 1, 2025Updated last year
- Example of hooking native functions in Android apps using Frida and JEB. Includes JNI analysis, sample app, and step-by-step guide for seβ¦β47Aug 2, 2024Updated last year
- x86_64 LKM linux rootkitβ16Jul 1, 2023Updated 2 years ago
- Beacon Object Files used for Cobalt Strikeβ19Jul 18, 2023Updated 2 years ago
- β17Nov 15, 2022Updated 3 years ago
- Proof-of-concept code for understanding the allow-jit entitlement on macOSβ31Feb 19, 2026Updated last month
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.β24Jan 15, 2026Updated 2 months ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by β¦β19Oct 15, 2020Updated 5 years ago
- Cobalt Strike BOFβ43Dec 10, 2025Updated 3 months ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.β14Oct 31, 2023Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utilsβ10Sep 14, 2024Updated last year
- Awesome MalDev Linksβ46Mar 2, 2026Updated 2 weeks ago
- Powershell and python utilties for Entra Connectβ29Jun 5, 2025Updated 9 months ago
- β31Sep 12, 2024Updated last year
- Rainbow table generation & lookup tools.β34Dec 17, 2025Updated 3 months ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Techniqueβ20Dec 3, 2024Updated last year
- A script for brute forcing Roku TVs and installing applications remotely.β12Mar 25, 2023Updated 2 years ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnosβ¦β43Jan 15, 2026Updated 2 months ago
- Phantom is project created to perform loading and executing .NET assemblies directly in memory within an IIS environment running in fullββ¦β68Mar 10, 2026Updated last week