Nordgaren / tabstate-utilLinks
☆34Updated last year
Alternatives and similar repositories for tabstate-util
Users that are interested in tabstate-util are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆123Updated 8 months ago
- Crappy Python code to render a QR code as "plaintext" with Unicode☆38Updated last year
- Using Discord as a C2 - Proof of Concept☆61Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆133Updated 2 years ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆104Updated last year
- Tool designed to exfiltrate OneDrive Business OCR Data☆123Updated 7 months ago
- Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.☆59Updated 2 years ago
- WMI virus, because funny☆292Updated 7 months ago
- Wordlist to crack .zip-file password☆204Updated 3 years ago
- uwu☆22Updated last year
- Lena's repo of Malware Monsters aka Malmons.☆43Updated last month
- 🧞♂️ malware analysis☆37Updated last year
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆75Updated 5 months ago
- macos stealer poc☆122Updated 2 months ago
- Public repository containing materials for various malware-related streams.☆36Updated 2 months ago
- x86-assembly-cheat-sheet: A must-have for quick reference in x86 Assembly. Covers fundamental concepts, instruction sets, & mem managemen…☆30Updated 11 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- A GUI and CLI tool for removing bloat from executables☆421Updated 2 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆136Updated 8 months ago
- A powershell module for hiding payloads in the pixels of images☆79Updated last year
- PasteBomb C2-less RAT☆318Updated 10 months ago
- Nuke It From Orbit - remove AV/EDR with physical access☆263Updated 9 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆197Updated last month
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆59Updated 2 years ago
- MailFail identifies and provides commands to exploit a large number of email-related misconfigurations for the current domain and subdoma…☆84Updated 2 weeks ago
- A reverse shell for Windows and Linux written in C.☆78Updated 3 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 3 months ago
- ☆294Updated last year
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆304Updated last year