Nordgaren / tabstate-utilLinks
☆34Updated last year
Alternatives and similar repositories for tabstate-util
Users that are interested in tabstate-util are comparing it to the libraries listed below
Sorting:
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆122Updated 11 months ago
- Crappy Python code to render a QR code as "plaintext" with Unicode☆39Updated last year
- uwu☆21Updated last year
- WMI virus, because funny☆299Updated 10 months ago
- Using Discord as a C2 - Proof of Concept☆61Updated 2 years ago
- Wordlist to crack .zip-file password☆206Updated 3 years ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆124Updated 10 months ago
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆106Updated last year
- 🧞♂️ malware analysis☆37Updated last year
- Discord C2 for Redteam....Need a better name☆135Updated 2 years ago
- A GUI and CLI tool for removing bloat from executables☆432Updated 4 months ago
- macos stealer poc☆130Updated 4 months ago
- ☆53Updated 4 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆78Updated 7 months ago
- A collection of malware families and malware samples which use the Rust programming language.☆185Updated last year
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆205Updated 4 months ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Tool to teleport your HTTP requests to different Cloudflare datacenters.☆141Updated 10 months ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- A tool to dump exposed .git repositories☆72Updated 5 months ago
- Ghidra script for extracting embedded Rust crate dependency strings from a compiled Rust binary☆34Updated 3 years ago
- A simple go Proof of Concept to start a new shell as TrustedInstaller☆61Updated 2 years ago
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 2 months ago
- ROT26 encryption, twice as secure as ROT13☆58Updated 10 months ago
- Tool for recovering the phone number tied to a Google account☆114Updated 5 months ago
- ☆37Updated 2 years ago
- My new C2 framework☆40Updated 3 years ago
- Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)☆341Updated 2 years ago
- Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.☆62Updated 2 years ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 6 months ago