A fork of openssh-portable for penetration testing purposes.
☆11May 18, 2018Updated 7 years ago
Alternatives and similar repositories for blackbear
Users that are interested in blackbear are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆14Jan 5, 2021Updated 5 years ago
- Fastly scans open ports on large networks and bruteforce login mechanism of found services☆12Aug 24, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Scan and categorize websites for rapid triage☆12Jun 23, 2022Updated 3 years ago
- Dump of the crypto-miner that got installed on my system☆14May 30, 2020Updated 5 years ago
- Reinforcement learning crypto trading bot☆10Oct 30, 2020Updated 5 years ago
- A toy database/query DSL☆11Aug 31, 2021Updated 4 years ago
- Simple utility for embedding files/resources inside golang binaries☆20Feb 20, 2021Updated 5 years ago
- DarkC0ders net is a open source botnet which is programmed in C#, using the .NET 2.0 Framework.☆10Dec 1, 2019Updated 6 years ago
- ☆10May 28, 2025Updated 10 months ago
- This is a small script to make the local exploitation process easier. It downloads the precompiled exploit for x86 and x64 architectures …☆31Aug 30, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- nixpkgs aiming for exploiting tools, which may include non-official package or difficult to push to mainstream.☆13Jul 25, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago
- This repository features Zyra, a crypto wallet tool that includes functionality for checking balances using mnemonic seed phrases. It all…☆13Aug 21, 2024Updated last year
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Inject shellcode into running processes in Linux.☆43Jul 10, 2024Updated last year
- ☆21Oct 22, 2019Updated 6 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- My Collection of Scripts, snippets, aliases and other stuff related to mIRC☆16Nov 30, 2024Updated last year
- Dodgy reflective DLL injector PoC for 32-bit Windows☆17Aug 20, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- A tool to show only printable characters of a file☆11Oct 2, 2023Updated 2 years ago
- Strategies to Gekko trading bot with backtests results and some useful tools.☆11May 5, 2018Updated 7 years ago
- ☆229May 10, 2018Updated 7 years ago
- Experimental and sneaky backdoor patch for OpenSSH Portable.☆26Dec 21, 2021Updated 4 years ago
- Reflective DLL Injection style process infector☆20Jul 23, 2018Updated 7 years ago
- ☆58Jul 16, 2017Updated 8 years ago
- Asqlmap is a terminal interface to automatize the famous SQL Injection's tool sqlmap. It provides a very simple interface to quickly perf…☆26May 1, 2022Updated 3 years ago
- Proofpoint URL Decoder☆20Oct 25, 2017Updated 8 years ago
- jasypt Decrypt Encrypt☆14Jan 7, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Let's play with some Node.js and sensors on a Raspberry Pi☆13Nov 11, 2016Updated 9 years ago
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- Used to get NTLMv2 Hashes from SMB☆23Oct 24, 2024Updated last year
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- A simple, intutive, feature rich, php web shell for pen testing.☆14Feb 4, 2020Updated 6 years ago
- A simple, POSIX shell script to check sysctl values against a predefined reference file.☆20Jan 12, 2025Updated last year