A light C# implant that bypasses Windows Firewall and Defender
☆27Oct 2, 2021Updated 4 years ago
Alternatives and similar repositories for Restless
Users that are interested in Restless are comparing it to the libraries listed below
Sorting:
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 3 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 4 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Run commands on linux through those pesky firewalls☆29Jul 21, 2015Updated 10 years ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated last year
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- Programa simple hecho en python que destruye tokens de discord.☆11Feb 25, 2023Updated 3 years ago
- Anywhere is a powerful botnet that allows for the remote control of compromised devices☆29Jan 19, 2023Updated 3 years ago
- This is my custom wordlist for WiFi passwords, tailored specifically for WiFi networks in Indonesia.☆13Nov 29, 2025Updated 3 months ago
- Short Discord Nuker, Quick To Load And Updated Often☆11Jun 21, 2023Updated 2 years ago
- Online Judge that accepts a solution and judges it as Accepted, Compilation Error, Runtime Error, Time Limit Exceeded or Wrong Answer.☆14Mar 10, 2023Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- Управление компьютером через телеграмм бота☆34Jul 1, 2021Updated 4 years ago
- Automate the build of a vulnerable AD environment.