Alphanumeric Encoder
☆25Oct 10, 2018Updated 7 years ago
Alternatives and similar repositories for Encoder
Users that are interested in Encoder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Mar 7, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Nov 6, 2016Updated 9 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- ☆25May 30, 2017Updated 8 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆37Jan 8, 2021Updated 5 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆59Nov 21, 2024Updated last year
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆17Dec 1, 2019Updated 6 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- ☆60Mar 28, 2020Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆72Feb 15, 2018Updated 8 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Finding and classifying ROP gadgets from rp++ output file with some regex and a CLI.☆25Mar 13, 2026Updated 3 weeks ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- bountytpl – template generator cli. By using a template similar to the ones for Template Generator (https://github.com/fransr/template-ge…☆47Aug 5, 2019Updated 6 years ago
- Kali Linux fresh installation setup scripts.☆14Feb 10, 2017Updated 9 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Jan 25, 2020Updated 6 years ago
- Burp Suite extension to help make Graphql request more readable☆32Dec 7, 2017Updated 8 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Dec 4, 2020Updated 5 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 10 months ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 4 years ago