Naranbataar / Corrupt
Simple and efficient file shredding
☆14Updated 5 years ago
Alternatives and similar repositories for Corrupt:
Users that are interested in Corrupt are comparing it to the libraries listed below
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- WMI SA stuffs☆29Updated 2 years ago
- Tool for obtaining information about PPL processes☆17Updated 11 months ago
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Updated last year
- PoC MSI payload based on ASEC/AhnLab's blog post☆23Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- ☆12Updated 4 years ago
- Ransoblin (Ransomware Bokoblin)☆17Updated 4 years ago
- ☆17Updated last year
- RedBlock is an Nginx module designed for offensive security operations and red teaming. This module empowers security professionals to ea…☆20Updated last year
- A collection of random small Aggressor snippets that don't warrant their own repo☆23Updated last year
- My nim learning experiments☆11Updated 2 years ago
- ☆12Updated 2 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- ☆13Updated 3 years ago
- Yet, Another Packer/Loader☆25Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆15Updated 4 years ago
- Execute embedded Mimikatz☆13Updated 3 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆14Updated last year
- A C# Tool to gather information about email breaches☆13Updated last year
- ☆11Updated 4 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 3 years ago
- ☆9Updated 2 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆21Updated 3 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 9 months ago
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago