Repository of tools used in my blog
☆52Mar 22, 2024Updated last year
Alternatives and similar repositories for Darkbyte
Users that are interested in Darkbyte are comparing it to the libraries listed below
Sorting:
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆16Mar 12, 2023Updated 2 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Multiplatform Telegram Bot in pure PowerShell☆55Dec 1, 2022Updated 3 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Feb 28, 2025Updated last year
- Full Valid Fake Data Generator☆103Sep 27, 2024Updated last year
- ☆17Feb 29, 2020Updated 6 years ago
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- ☆15Jul 30, 2022Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- ☆21Jul 18, 2017Updated 8 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 2 years ago
- A Working Discord Selfbot 2022 🔥 Made By TheAxes☆12Oct 22, 2022Updated 3 years ago
- ☆10Jun 26, 2024Updated last year
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- ☆10Aug 16, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- 🕵️♂️ Collect a dossier on a person by username from thousands of sites☆13Aug 26, 2023Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- A simple Chrome Stealer / Chrome Recovery for Windows 8 and above. Native. Written in C++.☆23Jun 15, 2020Updated 5 years ago
- A simple script to obfuscate batch(bat) code easily☆25Oct 21, 2023Updated 2 years ago
- Simple & Customizable DNS Data Exfiltrator☆113Jul 17, 2023Updated 2 years ago
- Binary builds for dep-scan - The Dependency Scanner☆10Apr 1, 2024Updated last year
- This is a project with .net server crypter for bypass AV's Runtime detection.☆11Sep 8, 2017Updated 8 years ago
- ATM security list☆12Aug 10, 2020Updated 5 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- This repository has the unified data required to perform user enumeration on various websites. Content is in a JSON file and can easily b…☆13Mar 28, 2025Updated 11 months ago