GhostTroops / shallot_eschalotLinks
create customized .onion addresses for your hidden service,make shallot and eschalot tools
☆13Updated 3 years ago
Alternatives and similar repositories for shallot_eschalot
Users that are interested in shallot_eschalot are comparing it to the libraries listed below
Sorting:
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- ☆17Updated 7 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 6 years ago
- Red Team C2 and Post Exploitation code☆36Updated 4 months ago
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Updated 8 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 6 years ago
- Scans for HTTP servers and finds given strings in HTTP body and HTTP response headers.☆35Updated 11 months ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- jgraphx 4.0.4 build for cs project☆22Updated 5 years ago
- A Linux RAT in C☆34Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- A CUSTOM CODED FUD DLL, CODED IN C , WHEN LOADED , VIA A DECOY WEB-DELIVERY MODULE( FIRING A DECOY PROGRAM), WILL GIVE A REVERSE SHELL (P…☆33Updated 6 years ago
- post exploitation user monitoring tool☆20Updated 7 years ago
- Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys☆21Updated 4 years ago
- ☆17Updated 3 years ago
- The best way to send emails in Go.☆11Updated 4 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- Code for blog written at 0xdarkvortex.dev Red Team TTPs Part 2☆19Updated 5 years ago
- ☆11Updated 6 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- C# AV bypass jank☆33Updated 4 years ago
- Handy script to automate the attack☆22Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 6 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Miscellaneous exploit scripts☆17Updated 3 years ago
- ☆13Updated 5 years ago
- JALSI - Just Another Lame Shellcode Injector☆30Updated 4 years ago