π¦ Anti-detect browser
β42Updated this week
Alternatives and similar repositories for camoufox
Users that are interested in camoufox are comparing it to the libraries listed below
Sorting:
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerabilityβ10Oct 29, 2023Updated 2 years ago
- Linux Wiper & Cryptor Via Base Utilsβ10Sep 14, 2024Updated last year
- A New Exploitation Technique for Visual Studio Projectsβ11Nov 5, 2023Updated 2 years ago
- Simple reverse ICMP shellβ14Apr 30, 2024Updated last year
- β11Dec 8, 2023Updated 2 years ago
- Tools and dumps related to the Smishing Triad and the USPS smishing campaign from late 2023 into 2024β11Apr 28, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority threadβ30Sep 24, 2025Updated 5 months ago
- top usernames from azure survey 2025β14Apr 25, 2025Updated 10 months ago
- Offensive Assembly code snippets.β13Jul 12, 2023Updated 2 years ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.β11Nov 24, 2023Updated 2 years ago
- Cobalt Strike BOFβ42Dec 10, 2025Updated 2 months ago
- CyberShield 2025 Intro to EDR Evasion Classβ17Jun 3, 2025Updated 8 months ago
- β10May 25, 2023Updated 2 years ago
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handlingβ11Oct 25, 2023Updated 2 years ago
- A script for brute forcing Roku TVs and installing applications remotely.β12Mar 25, 2023Updated 2 years ago
- β17Jan 9, 2025Updated last year
- .NET wrapper around LogonUserA to test credsβ12Jun 2, 2022Updated 3 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking sessionβ10Mar 10, 2019Updated 6 years ago
- A custom SentinelOne USB scanner.β18Mar 26, 2022Updated 3 years ago
- Challenges created for the US Cyber Open 2023 (Season 3)β13Jun 13, 2023Updated 2 years ago
- x86_64 LKM linux rootkitβ16Jul 1, 2023Updated 2 years ago
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.β14Oct 31, 2023Updated 2 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.β15Feb 11, 2025Updated last year
- Insecure reference example for the 2022 Collegiate eCTFβ13Apr 6, 2022Updated 3 years ago
- β16Nov 15, 2022Updated 3 years ago
- A collection of sample code used in some experiments with Sliver C2β16Mar 28, 2023Updated 2 years ago
- β18Aug 31, 2023Updated 2 years ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnosβ¦β43Jan 15, 2026Updated last month
- Rainbow table generation & lookup tools.β31Dec 17, 2025Updated 2 months ago
- CuteRAT is a stealthy remote access tool without any dependenciesβ17Sep 12, 2023Updated 2 years ago
- various methods of making API callsβ19Feb 1, 2025Updated last year
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by β¦β18Oct 15, 2020Updated 5 years ago
- Shadow Rebirth - An Aggressive Outbreak Anti-Debugging Techniqueβ20Dec 3, 2024Updated last year
- Parses logs created by Cobalt Strike or Brute Ratel and creates an SQLite DB which can be used to create custom reports.β24Jan 15, 2026Updated last month
- Understanding some of the Anti-Reversing Techniquesβ11Oct 6, 2019Updated 6 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LABβ12May 11, 2023Updated 2 years ago
- β31Sep 12, 2024Updated last year
- β17Oct 21, 2023Updated 2 years ago
- An automated scanning, enumeration, and note taking tool for pentestersβ13Jul 26, 2022Updated 3 years ago