This is intended to encrypt every bit of data in a unix filesystem using 256-bit AES with a self-destructing, randomly generated key.
☆58Nov 30, 2017Updated 8 years ago
Alternatives and similar repositories for fuxsocy
Users that are interested in fuxsocy are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2023-28121 - WooCommerce Payments < 5.6.2 - Unauthenticated Privilege Escalation [ Mass Add Admin User ]☆12Jul 14, 2023Updated 2 years ago
- This repository contains Loadable Kernel Modules (LKM) and LD_PRELOAD-based modules designed for penetration testing, red teaming, and se…☆13Feb 15, 2025Updated last year
- A fully functional MCP server and CLI for YouTube☆26Sep 30, 2025Updated 7 months ago
- ClickFix attack lures and variants☆10Aug 8, 2025Updated 8 months ago
- PHP WebShell Backdoor for Access all dir/file in the Website.☆14Jul 29, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Wisper helps to maintain access to windows machine and have some other cool features like UAC Disable,Firewall Disable,Dumping Credential…☆15Apr 3, 2021Updated 5 years ago
- ProcExp Driver (Ab)use☆22Dec 28, 2022Updated 3 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- ☆25Jun 13, 2022Updated 3 years ago
- A comprehensive tool for categorizing TryHackMe rooms, including details such as difficulty, room type, subscription status, and much mor…☆27Dec 3, 2025Updated 4 months ago
- Python Reverse Shell Builder with some advanced functionalities☆10Feb 16, 2021Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- This Telegram bot enables users to monitor specified Solana wallets for transactions and execute copy trades automatically. It's designed…☆20Aug 11, 2025Updated 8 months ago
- Simple script to bulk check if IPs match networks☆11Jan 11, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A swiss army knife for CLI operations catered to devs and security professionals.☆29Apr 5, 2026Updated 3 weeks ago
- Exploit systems using older WinRAR without knowing their username (unlike other projects)☆35Aug 17, 2025Updated 8 months ago
- ☆71Apr 21, 2021Updated 5 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- ESP32-S3 based USB-HID device with BadUSB capabilities to execute custom and user defined payloads☆52Sep 10, 2024Updated last year
- Discord C2 Profile for Mythic☆33Feb 18, 2025Updated last year
- Versão mais simples e compacta da famosa sp_WhoIsActive do Adam Machanic.☆12Oct 11, 2022Updated 3 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆24Jul 31, 2025Updated 8 months ago
- Small driver that uses alternative syscalls feature☆18May 9, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique☆28Nov 11, 2022Updated 3 years ago
- COLI (Command Orchestration & Logic Interface) – A visual orchestration layer for EWE, built for bug bounty automation. Create and run CL…☆36Oct 15, 2025Updated 6 months ago
- Standalone Cobalt Strike operation logging Aggressor script for Ghostwriter 2.0+☆36Dec 1, 2025Updated 4 months ago
- A template repository for building external data providers for Gatekeeper.☆12Aug 14, 2023Updated 2 years ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Jan 12, 2023Updated 3 years ago
- A Visual Studio Code Extension agent for Mythic C2☆72Nov 5, 2024Updated last year
- Detect whether an IP address belongs to a Tor exit node.☆22Jan 6, 2023Updated 3 years ago
- NTLM Hash Generator☆10Apr 2, 2021Updated 5 years ago
- Go library to allow native inline hooking in windows at runtime☆14Feb 7, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆12Dec 7, 2022Updated 3 years ago
- PHP 7 and safe-build update of the popular C99 variant of PHP Shell with MySQL support☆29Dec 1, 2019Updated 6 years ago
- Post-quantum Wireguard (Theory)☆13Sep 9, 2020Updated 5 years ago
- 🧰 Various PowerShell scripts for security, sysadmins, blue and red teams👫🏼☆56Apr 18, 2026Updated last week
- ☆16Feb 12, 2023Updated 3 years ago
- Open Standard Vulnerability & Compliance Scanner☆46Oct 15, 2015Updated 10 years ago
- The Sim programming language, a strongly typed, compiled programming language with a goal of simplicity. Sim是一门简洁的、强类型的编译型语言。☆12Apr 22, 2026Updated last week