All kinds of tiny shells
☆65Feb 3, 2023Updated 3 years ago
Alternatives and similar repositories for tiny-shells
Users that are interested in tiny-shells are comparing it to the libraries listed below
Sorting:
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 4 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Feb 13, 2024Updated 2 years ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Jan 28, 2025Updated last year
- Public tools, scripts or code snippets that can help when working with our products☆46Mar 12, 2026Updated last week
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆87Mar 11, 2026Updated last week
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 3 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- ☆89Jan 2, 2024Updated 2 years ago
- ☆17Jan 9, 2025Updated last year
- A collection of tools and detections for the Sliver C2 Frameworj☆133Apr 24, 2023Updated 2 years ago
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆818Mar 6, 2026Updated 2 weeks ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 7 months ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 6 months ago
- YARA, SIGMA, SNORT Rules based on Malware Analysis☆17Apr 23, 2025Updated 10 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆109Aug 11, 2023Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 3 years ago
- Lateral Movement Bof with MSI ODBC Driver Install☆147Sep 30, 2025Updated 5 months ago
- ☆12Jul 15, 2022Updated 3 years ago
- ☆34Aug 8, 2023Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆196Mar 15, 2026Updated last week
- Trend Micro XDR/Vision One Hunting Recipies☆18Apr 7, 2021Updated 4 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆27Nov 23, 2025Updated 3 months ago
- ☆55Oct 12, 2024Updated last year
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Mar 15, 2024Updated 2 years ago
- various methods of making API calls☆19Feb 1, 2025Updated last year
- Infect Shared Files In Memory for Lateral Movement☆192Dec 14, 2022Updated 3 years ago
- Yara Rules for Modern Malware☆78Mar 3, 2024Updated 2 years ago