Alphanumeric Encoder
☆25Oct 10, 2018Updated 7 years ago
Alternatives and similar repositories for Encoder
Users that are interested in Encoder are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- ☆17Oct 5, 2014Updated 11 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- ☆10Nov 24, 2018Updated 7 years ago
- Python api for usage with cobalt strike's External C2 specification☆64Nov 6, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A C# implementation of PrivExchange by @_dirkjan.☆155Mar 15, 2019Updated 7 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Mar 7, 2019Updated 7 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Plugins and signatures☆13Jun 11, 2019Updated 6 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆74Nov 6, 2016Updated 9 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- ☆25May 30, 2017Updated 8 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆37Jan 8, 2021Updated 5 years ago
- ☆169Dec 8, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Resolve syscall numbers at runtime for all Windows versions.☆59Nov 21, 2024Updated last year
- DNS File EXfiltration☆45Apr 12, 2024Updated 2 years ago
- ☆16Dec 1, 2019Updated 6 years ago
- Telegram notification for metasploit sessions.☆13Nov 22, 2018Updated 7 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- ☆60Mar 28, 2020Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆72Feb 15, 2018Updated 8 years ago
- A Powershell implementation of PrivExchange designed to run under the current user's context☆125Jan 31, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Using Microsoft 365 App Passwords for persistence☆23Sep 2, 2020Updated 5 years ago
- Cobalt Strike Aggressor script menu for Powerview/SharpView☆28May 8, 2019Updated 6 years ago
- Password spraying script and helper for creating password lists☆34Sep 4, 2020Updated 5 years ago
- Allows you to add breakpoints from IDA (from the graph/text view) to WinDbg easily☆14Oct 10, 2018Updated 7 years ago
- Tool for injecting a "TCP Relay" managed assembly into an unmanaged process☆65May 24, 2019Updated 6 years ago
- bountytpl – template generator cli. By using a template similar to the ones for Template Generator (https://github.com/fransr/template-ge…☆47Aug 5, 2019Updated 6 years ago
- Kali Linux fresh installation setup scripts.☆14Feb 10, 2017Updated 9 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Scripts I used during CTP☆68Jul 11, 2020Updated 5 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Jan 25, 2020Updated 6 years ago
- Burp Suite extension to help make Graphql request more readable☆32Dec 7, 2017Updated 8 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆53Dec 4, 2020Updated 5 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 11 months ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago