☆42Sep 30, 2024Updated last year
Alternatives and similar repositories for evil-cups
Users that are interested in evil-cups are comparing it to the libraries listed below
Sorting:
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆17Mar 19, 2025Updated 11 months ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- ☆14Mar 19, 2024Updated last year
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- Little java tool to decrypt passwords from Openfire embedded-db☆16Nov 14, 2015Updated 10 years ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆66Oct 7, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- ☆22Dec 30, 2025Updated 2 months ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- Bruteforce Keepass databases (KDBX 4.x format)☆138Jul 16, 2024Updated last year
- Bloodhound agent for Mythic☆23Apr 19, 2025Updated 10 months ago
- WebClientRelayUp - an universal no-fix local privilege escalation in domain-joined windows workstations in default configuration.☆69Updated this week
- ☆22Jun 9, 2025Updated 8 months ago
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 10 months ago
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- WSDL Parser extension for Burp☆20Feb 13, 2017Updated 9 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- A python tool to parse and describe the contents of a raw ntSecurityDescriptor structure.☆28Aug 18, 2025Updated 6 months ago
- Nemesis agent for Mythic☆28Dec 11, 2025Updated 2 months ago
- Generate Secure, Polymorphic, Evasive (lol) Payloads☆29Oct 2, 2025Updated 5 months ago
- A tool to verify and create PE Checksums for Portable Executable (PE) files.☆56Jun 14, 2023Updated 2 years ago
- This exploit rebuilds and exploit the CVE-2019-16098 which is in driver Micro-Star MSI Afterburner 4.6.2.15658 (aka RTCore64.sys and RTCo…☆30Aug 5, 2024Updated last year
- Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by …☆24Apr 4, 2023Updated 2 years ago
- Apache OFBIZ Path traversal leading to RCE POC[CVE-2024-32113 & CVE-2024-36104]☆27Jun 3, 2024Updated last year
- malware written for educational purposes☆71Dec 31, 2025Updated 2 months ago
- AI designed for cybersecurity professionals, ethical hackers, Malware, and penetration testers. It assists in vulnerability analysis, sec…☆17Dec 26, 2025Updated 2 months ago
- CVE-2024-4879 - Jelly Template Injection Vulnerability in ServiceNow☆26Jul 13, 2024Updated last year
- Payload Generation Workflow☆40Jul 18, 2025Updated 7 months ago
- A structured, continuously updated threat-intelligence repository focused on ransomware families and threat actors.☆37Updated this week
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆29Aug 24, 2024Updated last year
- My little precious collection of Linux 4.x kernel rootkits☆28Jul 27, 2024Updated last year
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆37Dec 12, 2025Updated 2 months ago
- pwnkit: Local Privilege Escalation in polkit's pkexec (CVE-2021-4034)☆25Jan 30, 2022Updated 4 years ago
- Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)☆130Dec 16, 2024Updated last year
- A python3 script searching for secret on swaggerhub☆66Mar 22, 2022Updated 3 years ago
- ☆30Aug 24, 2025Updated 6 months ago