Ekultek / GraffitiView external linksLinks
A tool to generate obfuscated one liners to aid in penetration testing
☆180Jan 29, 2019Updated 7 years ago
Alternatives and similar repositories for Graffiti
Users that are interested in Graffiti are comparing it to the libraries listed below
Sorting:
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- An Bash&Python Script For Generating Payloads that Bypasses All Antivirus so far [FUD]☆293Sep 9, 2018Updated 7 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- A simple XSS finding tool☆110Nov 9, 2018Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Automate Metasploit scanning and exploitation☆117Jul 20, 2025Updated 6 months ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆254May 1, 2023Updated 2 years ago
- log file scrubber☆15Jul 27, 2018Updated 7 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆277Aug 24, 2023Updated 2 years ago
- Determine everything you need to know to about a system☆32Sep 13, 2018Updated 7 years ago
- Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.☆950May 8, 2019Updated 6 years ago
- Embedding a "UAC-Bypassing" function into your custom payload☆98Aug 13, 2022Updated 3 years ago
- Powershell C2 Server and Implants☆574Nov 11, 2019Updated 6 years ago
- a hash query tool☆36Feb 12, 2019Updated 7 years ago
- Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in …☆317Mar 31, 2021Updated 4 years ago
- Toolkit for implant attack of IoT devices☆137Sep 6, 2018Updated 7 years ago
- PoC Thread Execution Hijacking for Win32 Code Injection☆178Aug 8, 2024Updated last year
- Easy files and payloads delivery over DNS☆424Jan 3, 2026Updated last month
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆538Mar 27, 2022Updated 3 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Aug 7, 2020Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- Code from this article: https://blog.rapid7.com/2018/05/03/hiding-metasploit-shellcode-to-evade-windows-defender/☆176Jul 21, 2020Updated 5 years ago
- AntiVirus Evasion Tool☆1,739Apr 23, 2025Updated 9 months ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- ☆106May 28, 2021Updated 4 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- macOS Privilege Escalation Helper☆143Feb 17, 2025Updated 11 months ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 6 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆2,233Dec 27, 2023Updated 2 years ago
- Advanced reconnaissance utility☆992Nov 20, 2023Updated 2 years ago
- Python / C# Unmanaged PowerShell based RAT☆771Mar 29, 2023Updated 2 years ago
- DNS-Shell is an interactive Shell over DNS channel☆529Oct 11, 2020Updated 5 years ago
- SharpSploit is a .NET post-exploitation library written in C#☆1,859Aug 12, 2021Updated 4 years ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,305Jan 31, 2022Updated 4 years ago
- Tool to deploy a post-exploitation prompt at any time☆320May 28, 2021Updated 4 years ago