Nordgaren / tabstate-utilLinks
☆34Updated last year
Alternatives and similar repositories for tabstate-util
Users that are interested in tabstate-util are comparing it to the libraries listed below
Sorting:
- Crappy Python code to render a QR code as "plaintext" with Unicode☆39Updated last year
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year
- uwu☆21Updated last year
- Discord C2 for Redteam....Need a better name☆142Updated 2 years ago
- A tool to dump exposed .git repositories☆74Updated 7 months ago
- 🧞♂️ malware analysis☆38Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆107Updated last year
- Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.☆63Updated 2 years ago
- A targeted DNS cache poisoner☆124Updated 3 years ago
- Using Discord as a C2 - Proof of Concept☆62Updated 3 years ago
- Crappy Golang code to list local listening ports and their associated processes.☆32Updated 2 years ago
- Tool designed to exfiltrate OneDrive Business OCR Data☆125Updated last year
- My new C2 framework☆40Updated 3 years ago
- A PowerShell script that attempts to help malware analysts hide their Windows VirtualBox Windows VM's from malware that may be trying to …☆394Updated 6 months ago
- Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro☆77Updated 9 months ago
- Wordlist to crack .zip-file password☆207Updated 3 years ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆318Updated 2 years ago
- ☆27Updated 3 months ago
- A GUI and CLI tool for removing bloat from executables☆441Updated 6 months ago
- UFSIT scripts and tools for hardening and auditing☆14Updated 8 months ago
- CTF toolbox☆22Updated 2 years ago
- Public repository containing materials for various malware-related streams.☆48Updated last week
- Lena's repo of Malware Monsters aka Malmons.☆45Updated 4 months ago
- Collection of steganography tools for images and text☆42Updated 2 years ago
- x86-assembly-cheat-sheet: A must-have for quick reference in x86 Assembly. Covers fundamental concepts, instruction sets, & mem managemen…☆51Updated last year
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆33Updated 2 years ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆152Updated last year
- Nuke It From Orbit - remove AV/EDR with physical access☆271Updated last year
- A rust library that allows you to delete your executable while it's running.☆91Updated 2 years ago
- PasteBomb C2-less RAT☆318Updated 3 months ago