All kinds of tiny shells
☆65Feb 3, 2023Updated 3 years ago
Alternatives and similar repositories for tiny-shells
Users that are interested in tiny-shells are comparing it to the libraries listed below
Sorting:
- Interactive program for loading AES encrypted shellcode with Dynamic Invocation, and interactive .NET assemblies in memory.☆13Mar 16, 2022Updated 3 years ago
- A tool to find folders excluded from AV real-time scanning using a time oracle☆233Feb 13, 2024Updated 2 years ago
- A proof-of-concept re-assembler for reverse VNC traffic.☆24May 21, 2023Updated 2 years ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆83Apr 27, 2024Updated last year
- IVRE's fork of the famous TCP port scanner. See below for details.☆39Jan 28, 2025Updated last year
- Public tools, scripts or code snippets that can help when working with our products☆46Feb 11, 2026Updated 2 weeks ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- Indicators of compromise from to analysis and research by Nextron Threat Research team☆12Sep 17, 2025Updated 5 months ago
- ☆11Dec 8, 2023Updated 2 years ago
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- SHELLSILO is a cutting-edge tool that translates C syntax into syscall assembly and its corresponding shellcode. It streamlines the proce…☆154Aug 4, 2025Updated 6 months ago
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆26Nov 23, 2025Updated 3 months ago
- The backend server handling API requests and task management☆55Updated this week
- ☆17Jan 9, 2025Updated last year
- red team tips and trix☆12Jun 27, 2025Updated 8 months ago
- A repository hosting example goodware evtx logs containing sample software installation and basic user interaction☆86Dec 17, 2025Updated 2 months ago
- Lifetime AMSI bypass.☆36Apr 21, 2025Updated 10 months ago
- Scripts to secure and harden Mac OS X☆30Nov 16, 2021Updated 4 years ago
- PAM Backdoor☆32Mar 29, 2023Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- custom Python script to perform Yara matching in Cortex XDR☆14May 18, 2021Updated 4 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- ☆12Jul 15, 2022Updated 3 years ago
- A collection of tools and detections for the Sliver C2 Frameworj☆132Apr 24, 2023Updated 2 years ago
- ☆89Jan 2, 2024Updated 2 years ago
- FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is de…☆817Feb 17, 2025Updated last year
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Dec 4, 2025Updated 2 months ago
- tool for identifying guest relationships between companies☆103Jun 27, 2024Updated last year
- yet another sleep encryption thing. also used the default github repo name for this one.☆69May 11, 2023Updated 2 years ago
- A repository to share publicly available Velociraptor detection content☆196Updated this week
- ☆34Aug 8, 2023Updated 2 years ago
- Just-In-Time Access Management Solution for Power Platform☆17Dec 19, 2023Updated 2 years ago
- ☆15Dec 22, 2021Updated 4 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A collection of functions to check Microsoft Exchange Servers for ProxyLogon and ProxyShell☆15Sep 3, 2021Updated 4 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- Detection Ideas & Rules repository.☆178Sep 10, 2021Updated 4 years ago
- Reasonably undetected shellcode stager and executer.☆36May 23, 2025Updated 9 months ago
- A tool to Impersonate logged on users without touching LSASS (Including non-Interactive sessions).☆90Nov 23, 2022Updated 3 years ago