EgeBalci / BitBender
BitBender is a byte manipulation tool
☆12Updated 6 years ago
Related projects: ⓘ
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 8 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 8 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆12Updated 12 years ago
- Fuzzing Framework☆10Updated 6 years ago
- Local enumeration and exploitation framework.☆18Updated 7 years ago
- ☆11Updated this week
- FWRF is a open source tool for firmware web-side analysis.☆12Updated 9 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 10 years ago
- Virtual host brute forcer☆22Updated 10 years ago
- 0x88 exploit pack Decoded☆28Updated 10 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 7 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆15Updated 8 years ago
- A curated list of awesome Hacking tutorials, tools and resources☆10Updated 2 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- smtp-user-enum.pl ported into a recon-ng module.☆9Updated 10 years ago
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- ☆10Updated this week
- A simple shellcode runner☆20Updated 10 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆40Updated 6 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆26Updated 7 years ago
- ☆21Updated this week
- ☆10Updated this week
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆20Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Updated last year
- proxyd proxies data between TCP, TLS, and unix sockets☆17Updated 7 years ago
- Vulnerable XSLT Console Application☆10Updated 6 years ago
- Try harder to bypass that WAF...☆14Updated 9 years ago