☆43Apr 28, 2024Updated last year
Alternatives and similar repositories for DataBouncing
Users that are interested in DataBouncing are comparing it to the libraries listed below
Sorting:
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Convert .reg to registry hive and reciprocally, without elevation☆83Feb 18, 2026Updated last week
- ☆26Apr 5, 2020Updated 5 years ago
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- A fully functional payload management system for adding that extra spice to your web testing.☆13Feb 1, 2026Updated last month
- OSINT Web Page Finder☆11May 20, 2020Updated 5 years ago
- Cobalt Strike Aggressor Script Collection☆19Mar 30, 2018Updated 7 years ago
- ☆19Jun 29, 2012Updated 13 years ago
- VBA Macro obfuscator☆13Sep 20, 2020Updated 5 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- ELF Beacon Object File (BOF) Template☆19Nov 18, 2024Updated last year
- Ansible role to deploy RedELK server☆19Sep 11, 2023Updated 2 years ago
- ☆70Oct 30, 2023Updated 2 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- This repo goes with the blog entry at blog.malicious.group entitled "Writing your own RDI / sRDI loader using C and ASM".☆87Apr 11, 2023Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 6 months ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆20Mar 21, 2018Updated 7 years ago
- terraform deployment for red team☆26Dec 13, 2022Updated 3 years ago
- Genome-scale metabolic model of Methylococcus capsulatus.☆12Apr 12, 2019Updated 6 years ago
- Dump objects from .NET dumps.☆51Apr 19, 2022Updated 3 years ago
- ☆94Sep 3, 2020Updated 5 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- another nmap summarising script☆26Oct 1, 2020Updated 5 years ago
- User-mode implementation of HTTP.SYS. Implements HTTP 1.1 of the "HTTP Server API 2.0" for web servers☆44Feb 17, 2025Updated last year
- A collection of interesting REXX scripts to ease the life a mainframe pentester☆28Jan 31, 2017Updated 9 years ago
- ☆27Aug 18, 2023Updated 2 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- Pass-thru web server for traffic redirection☆28May 6, 2019Updated 6 years ago
- async parser for JET☆25Nov 14, 2025Updated 3 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- ☆25Jan 16, 2026Updated last month
- ZoomBotC2 is a stealthy Command and Control (C2) framework that leverages Zoom's API endpoints for covert communication between implants …☆56Jun 30, 2025Updated 8 months ago
- Sustainable shellcode evasion☆112Dec 11, 2024Updated last year
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆60Feb 4, 2025Updated last year
- Linux process injection PoCs☆29Apr 30, 2024Updated last year
- Universal root exploit for the linux kernel☆38Apr 30, 2024Updated last year
- Tool to extract powerful tokens from Office desktop apps memory☆74Mar 1, 2024Updated 2 years ago
- Nim Library for Offensive Security Development☆197Sep 4, 2023Updated 2 years ago