A tool to generate obfuscated one liners to aid in penetration testing
☆180Jan 29, 2019Updated 7 years ago
Alternatives and similar repositories for Graffiti
Users that are interested in Graffiti are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆24Sep 2, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆37Aug 31, 2018Updated 7 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Aug 21, 2019Updated 6 years ago
- A simple XSS finding tool☆112Nov 9, 2018Updated 7 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆142Apr 29, 2019Updated 6 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Aug 24, 2023Updated 2 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 8 months ago
- Automatic UAC-Bypassing for custom payloads during privilege escalation testing☆98Aug 13, 2022Updated 3 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆947May 8, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Download files out of open AWS buckets☆39Dec 12, 2018Updated 7 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆255May 1, 2023Updated 2 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- Easy files and payloads delivery over DNS☆423Jan 3, 2026Updated 3 months ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆177Jul 21, 2020Updated 5 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆318Mar 31, 2021Updated 5 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Advanced reconnaissance utility☆996Nov 20, 2023Updated 2 years ago
- AntiVirus Evasion Tool☆1,750Apr 23, 2025Updated 11 months ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆177Aug 8, 2024Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- AutoIt HackTool, Shortcuts .lnk Payloads Generator As LNK-KISSER.☆104Feb 6, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Malicious Macro Generator☆831Apr 17, 2019Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Linux post exploitation framework written in bash designed to assist red teams in persistence, reconnaissance, privilege escalation and l…☆542Apr 14, 2021Updated 5 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,236Dec 27, 2023Updated 2 years ago
- ☆183Feb 21, 2022Updated 4 years ago
- macOS Privilege Escalation Helper☆144Feb 17, 2025Updated last year
- RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0.☆330Jul 7, 2023Updated 2 years ago