A light C# implant that bypasses Windows Firewall and Defender
☆26Oct 2, 2021Updated 4 years ago
Alternatives and similar repositories for Restless
Users that are interested in Restless are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A copy of my little beautiful malware I used in IRSeC 2019☆12Dec 3, 2020Updated 5 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Local Privilege Escalation Miner☆32Apr 11, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- nmap detection scripts for CVE-2022-45477, CVE-2022-45479, CVE-2022-45482, CVE-2022-45481☆16Apr 19, 2024Updated 2 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆20Mar 18, 2021Updated 5 years ago
- Post-exploitation tool collects data going out and coming into the browser and makes use of it.☆23Apr 22, 2022Updated 4 years ago
- Customized Kali Linux - Ansible playbook☆67Dec 7, 2020Updated 5 years ago
- Run commands on linux through those pesky firewalls☆32Jul 21, 2015Updated 10 years ago
- Blackhat 2025 presentation and codebase: AI SOC agent & MCP server for automated security investigation, alert triage, and incident respo…☆28Dec 28, 2025Updated 4 months ago
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 4 years ago
- Управление компьютером через телеграмм бота☆35Jul 1, 2021Updated 4 years ago
- A C2 project that controls a self-propagating MS17-010 worm.☆76Jun 18, 2021Updated 4 years ago
- Sleep obfuscation for shellcode implants and their reflective shit☆55Sep 19, 2023Updated 2 years ago
- Dump Teams conversations☆18Jun 9, 2021Updated 4 years ago
- Code and Development environment for adventofcode.com - 2019 edition☆20Dec 16, 2023Updated 2 years ago
- Reverse shell macro using Word VBA☆17Oct 10, 2020Updated 5 years ago
- Discord C2 for Redteam....Need a better name☆143May 7, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Work in Progress repo☆16Apr 18, 2019Updated 7 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Analyze a real-time IPv4 packet stream and export metrics about the data flows☆14Jan 29, 2020Updated 6 years ago
- 🔗 Simplify and Supercharge Your Links!☆17Apr 23, 2026Updated last week
- iDevice Exploit Injector☆14Apr 26, 2011Updated 15 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆49Aug 18, 2021Updated 4 years ago
- IOCTL-Flooder is a verbose tool designed to help with Windows driver fuzzing by brute forcing IOCTLs on loaded drivers. GetLastError is u…☆10Aug 21, 2018Updated 7 years ago
- All in one tool for Information Gathering and Vulnerability Scanning☆13Jan 13, 2020Updated 6 years ago
- SQLite integration via WASM☆12Dec 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- Install zsh on termux☆12Dec 30, 2024Updated last year
- 🔐 explores techniques to exploit and manipulate buffer overflow vulnerabilities in a program.☆23Jun 18, 2023Updated 2 years ago
- Package for word stress detection☆11Jan 27, 2023Updated 3 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- the assembly shell and backdoor Trojan☆18Dec 19, 2021Updated 4 years ago
- Python module to interact with THOR Thunderstorm service☆18Dec 5, 2025Updated 4 months ago