Nordgaren / tabstate-util
☆35Updated 9 months ago
Alternatives and similar repositories for tabstate-util
Users that are interested in tabstate-util are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆119Updated 4 months ago
- uwu☆22Updated 8 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆97Updated 10 months ago
- Crappy Python code to render a QR code as "plaintext" with Unicode☆38Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆112Updated 3 months ago
- 🧞♂️ malware analysis☆36Updated last year
- Discord C2 for Redteam....Need a better name☆129Updated 2 years ago
- Obfuscate your batch files to prevent people from stealing code!☆2Updated 4 years ago
- The Havoc Framework☆56Updated 2 years ago
- ☆59Updated 2 years ago
- A powershell module for hiding payloads in the pixels of images☆60Updated 10 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated last month
- Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.☆56Updated last year
- A full & Open Source compatible Petya Ransomware Executable Placeholder☆73Updated 11 months ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆57Updated last year
- Wordlist to crack .zip-file password☆202Updated 2 years ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆291Updated last year
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆144Updated 2 years ago
- macos stealer poc☆113Updated 3 weeks ago
- The result of research and investigation of malware development tricks, techniques, evasion, cryptography and linux malware☆43Updated last month
- The best powershell obfuscator ever made☆106Updated last month
- Evade EDR's the simple way, by not touching any of the API's they hook.☆140Updated 3 months ago
- Orbital - A Custom CTF Platform☆26Updated this week
- A collection of art inspired by the world of cybersecurity and hacking culture.☆34Updated this week
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆86Updated 2 weeks ago
- My collection of malware dev links☆266Updated 8 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆258Updated 5 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆111Updated 4 months ago
- C# Library and research notes for Windows 11 Notepad State Files☆17Updated 2 weeks ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago