Nordgaren / tabstate-utilLinks
☆36Updated 11 months ago
Alternatives and similar repositories for tabstate-util
Users that are interested in tabstate-util are comparing it to the libraries listed below
Sorting:
- Crappy Python code to render a QR code as "plaintext" with Unicode☆38Updated last year
- Using Discord as a C2 - Proof of Concept☆60Updated 2 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated 6 months ago
- A GUI and CLI tool for removing bloat from executables☆408Updated 2 weeks ago
- Discord C2 for Redteam....Need a better name☆133Updated 2 years ago
- Wordlist to crack .zip-file password☆204Updated 2 years ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆100Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆112Updated 5 months ago
- WMI virus, because funny☆285Updated 5 months ago
- Public repository containing materials for various malware-related streams.☆36Updated last week
- uwu☆21Updated 11 months ago
- A collection of malware families and malware samples which use the Rust programming language.☆170Updated last year
- Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.☆56Updated 2 years ago
- A list of useful tools for Malware Analysis (will be updated regularly)☆142Updated 10 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆188Updated 4 months ago
- Various Tutorials☆204Updated last month
- A targeted DNS cache poisoner☆121Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆61Updated last year
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆371Updated 5 months ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆86Updated 2 months ago
- 🧞♂️ malware analysis☆37Updated last year
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆26Updated 10 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆74Updated 3 months ago
- ☆87Updated last year
- A repository of credential stealer formats☆220Updated last month
- UFSIT scripts and tools for hardening and auditing☆14Updated last month
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆44Updated last year
- ☆35Updated last year
- The Havoc Framework☆58Updated 2 years ago