Local Privilege Escalation Miner
☆32Apr 11, 2022Updated 3 years ago
Alternatives and similar repositories for Miner
Users that are interested in Miner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 5 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Run commands on linux through those pesky firewalls☆30Jul 21, 2015Updated 10 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- A light C# implant that bypasses Windows Firewall and Defender☆27Oct 2, 2021Updated 4 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆67Dec 7, 2020Updated 5 years ago
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 5 years ago
- Lightweight FreeBSD rootkit for stealth persistence, process hiding, and system control.☆19Mar 2, 2020Updated 6 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆77Jun 18, 2021Updated 4 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 8 months ago
- ☆12Nov 12, 2023Updated 2 years ago
- RITSEC Weekly Labs☆11Mar 3, 2019Updated 7 years ago
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 3 months ago
- In line function hooking LKM rootkit☆52Mar 5, 2020Updated 6 years ago
- Repository For CTF Write-ups☆17Sep 11, 2023Updated 2 years ago
- It's what all the kids are talking about☆12Apr 25, 2023Updated 2 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Jan 21, 2020Updated 6 years ago
- Discord C2 for Redteam....Need a better name☆142May 7, 2023Updated 2 years ago
- Zextras Technical Documentation☆12Updated this week
- pure Python binary analysis framework☆23Oct 26, 2018Updated 7 years ago
- Windows NTLM Authentication Backdoor☆16Jan 27, 2022Updated 4 years ago
- Collection of shellcodes that use a variety of syscalls in order to bypass some seccomp configurations☆74May 19, 2017Updated 8 years ago
- List of Red Team Repositories☆17Feb 26, 2019Updated 7 years ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- This project analyzes PE information of exe files to detect malware. In this repository you will learn how to create your own dataset an…☆13May 11, 2022Updated 3 years ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- Code and Development environment for adventofcode.com - 2019 edition☆20Dec 16, 2023Updated 2 years ago
- A collection of repositories used to make ISTS 16 possible.☆15Feb 13, 2018Updated 8 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago