Repository of tools used in my blog
☆52Mar 22, 2024Updated 2 years ago
Alternatives and similar repositories for Darkbyte
Users that are interested in Darkbyte are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Mar 12, 2023Updated 3 years ago
- Multiplatform Telegram Bot in pure PowerShell☆56Dec 1, 2022Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collection of my talks and workshops about hacking & cybersecurity☆28Feb 28, 2025Updated last year
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Full Valid Fake Data Generator☆103Sep 27, 2024Updated last year
- A multiplatform spyware with many features.☆13Sep 24, 2021Updated 4 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Deobfuscator for : https://github.com/Blank-c/BlankOBF☆14Aug 21, 2023Updated 2 years ago
- The Shadow Attack Framework☆1,115Sep 4, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A Working Discord Selfbot 2022 🔥 Made By TheAxes☆12Oct 22, 2022Updated 3 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Modular framework to exploit UPS devices☆65Mar 1, 2023Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 3 years ago
- ☆10Aug 16, 2019Updated 6 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Jul 17, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆34May 18, 2023Updated 2 years ago
- ☆10May 20, 2020Updated 5 years ago
- Some ICS Vulnerabilities I've found will be listed here.☆13Nov 18, 2016Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Aug 19, 2015Updated 10 years ago
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- A RAT, script that controls other pcs remotly, for educational purposes only☆13Jun 18, 2024Updated last year
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily b…☆13Mar 28, 2025Updated 11 months ago
- this project is a smart sniffer made by BlackDOS team☆11Jun 14, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- Analysis and Modification Tool for Executables☆17Mar 28, 2019Updated 6 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- A Mirai type botnet called "Meerkat" very known in the community. Methods include basic TCP flags, L7, OVH, UDPRAW & UDP, XMAS, STD, & GR…☆25Aug 21, 2022Updated 3 years ago
- The list of write-ups, articles, and PoC of various interesting in context of OSINT☆24Mar 13, 2025Updated last year
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year