CrowdStrike / Tortilla
☆295Updated 8 years ago
Alternatives and similar repositories for Tortilla:
Users that are interested in Tortilla are comparing it to the libraries listed below
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- Cisco Talos MBR Filter Driver☆340Updated 7 years ago
- Fake sshd that logs ip addresses, usernames, and passwords.☆194Updated 8 years ago
- A collection of tools for dealing with TrickBot☆199Updated 7 years ago
- ☆82Updated 7 years ago
- ☆425Updated 7 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆333Updated 7 years ago
- Windows Remote Post Breach Tool via Telegram☆132Updated 7 years ago
- A repository of tools and scripts related to malware analysis☆246Updated 8 years ago
- Decryption Tool☆142Updated 6 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆379Updated 2 years ago
- A rogue-USB-device defeat program for Windows.☆188Updated 2 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆224Updated 6 years ago
- Code written as part of our various malware investigations☆393Updated 2 months ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Get email notification when Virus Total has a copy of your binary.☆167Updated 4 years ago
- PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!☆254Updated 7 years ago
- ☆73Updated 7 years ago
- Web Sight Docker Deployment☆124Updated 7 years ago
- Auto Installer Script for Cuckoo Sandbox☆165Updated 6 years ago
- SSLStrip version to defeat HSTS☆69Updated 2 years ago
- Mac OS Trojan (RAT) made with love <3☆91Updated 8 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆158Updated 9 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- A POSIX-compliant, fully automated WPA PSK PMKID and handshake capture script aimed at penetration testing☆356Updated 5 months ago
- ☆206Updated 6 years ago
- Malicious USB☆170Updated last year
- Get your APT on using social media as a tool for data exfiltration.☆145Updated 2 years ago
- Demonsaw Source Code☆123Updated 3 years ago
- IDPS & SandBox & AntiVirus STEALTH KILLER. MorphAES is the world's first polymorphic shellcode engine, with metamorphic properties and ca…☆321Updated 2 years ago