Tool to retrieve Config from Redline C2 servers
☆16Mar 14, 2023Updated 2 years ago
Alternatives and similar repositories for redline_config
Users that are interested in redline_config are comparing it to the libraries listed below
Sorting:
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆28Apr 22, 2023Updated 2 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- ☆15Apr 5, 2023Updated 2 years ago
- ☆20Mar 21, 2024Updated last year
- ☆18Apr 3, 2023Updated 2 years ago
- An x64dbg plugin which helps make sense of long C++ symbols☆59May 12, 2023Updated 2 years ago
- powershell script i wrote that can suspend an arbitrary process (with limits)☆22Mar 26, 2023Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)☆31Oct 12, 2021Updated 4 years ago
- CobaltStrike beacon written in golang☆27Apr 4, 2023Updated 2 years ago
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆29Jun 14, 2022Updated 3 years ago
- ☆31Mar 21, 2023Updated 2 years ago
- com_media allowed paths that are not intended for image uploads to RCE☆71Mar 3, 2021Updated 5 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- ☆13Nov 21, 2024Updated last year
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆92Dec 2, 2025Updated 3 months ago
- This repository contains a social real-time application for iOS devices. The app leverages Amazon IVS Real-time streaming and uses the Am…☆11Nov 19, 2025Updated 3 months ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A powerful Discord RAT for remote control & monitoring. Capture screenshots, grab passwords, evade detection.☆12Sep 28, 2025Updated 5 months ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆87Dec 29, 2023Updated 2 years ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆48Apr 14, 2025Updated 10 months ago
- ☆38Apr 7, 2023Updated 2 years ago
- Packet Monkey is a tool to filter and classify PCAPs using Wireshark filters☆11Feb 27, 2026Updated last week
- A Modern, stable and advanced login system.☆13Oct 13, 2021Updated 4 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- The mission of Black Lotus Labs is to leverage our network visibility to both help protect customers and keep the internet clean.☆12Jun 18, 2021Updated 4 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- ☆47Apr 10, 2023Updated 2 years ago
- ☆47Feb 11, 2023Updated 3 years ago
- Packed Malware Analyzer (PACKMAN)☆12Jan 31, 2016Updated 10 years ago
- Windows Service with the implementation of the Process hollowing technique to run shellcode☆14Jul 20, 2023Updated 2 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- Former UEFI Firmware Rootkit Replicating MoonBounce / ESPECTRE☆11Jun 14, 2022Updated 3 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- ☆13Jul 14, 2020Updated 5 years ago
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago