Nordgaren / tabstate-util
☆33Updated 6 months ago
Alternatives and similar repositories for tabstate-util:
Users that are interested in tabstate-util are comparing it to the libraries listed below
- Crappy Python code to render a QR code as "plaintext" with Unicode☆34Updated 10 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆116Updated last month
- uwu☆21Updated 6 months ago
- Shitty Nim code that reads in a file and converts it into \x hex representation, for the use of shellcode binaries.☆52Updated last year
- ☆56Updated 2 years ago
- Wordlist to crack .zip-file password☆200Updated 2 years ago
- Discord C2 for Redteam....Need a better name☆116Updated last year
- What the name says....☆91Updated 5 months ago
- A powershell module for hiding payloads in the pixels of images☆57Updated 7 months ago
- 🧞♂️ malware analysis☆34Updated 11 months ago
- The Havoc Framework☆54Updated 2 years ago
- My new C2 framework☆40Updated 2 years ago
- A new generation web interface for Hashcat☆35Updated 8 months ago
- A script to download all the challenges and files from a CTFd instance☆13Updated 3 months ago
- Obfuscated, FUD Simple PowerShell Reverse Shell One-Liner☆76Updated last year
- x86-64 Malware Crypter built in Rust for Windows with Anti-VM, powered by memexec☆92Updated 7 months ago
- PyDFIRRam is a Python library leveraging Volatility 3 to simplify and enhance memory forensics. It streamlines the research, parsing, and…☆25Updated 5 months ago
- Public repository containing materials for various malware-related streams.☆34Updated last month
- Windows File Integrity -- an archive of information on installed Windows binaries.☆31Updated 2 years ago
- ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminatin…☆85Updated last month
- Phishing with a fake reCAPTCHA☆485Updated 5 months ago
- ☆8Updated 7 months ago
- Win32 Shellcode CheatSheet: Your visual guide for crafting and understanding shellcode. Ideal for malware, and exploit developers☆54Updated 5 months ago
- Obfuscate your batch files to prevent people from stealing code!☆2Updated 4 years ago
- Study materials for the Certified Red Team Expert (CRTE) exam, covering essential concepts in red teaming and penetration testing.☆113Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆102Updated this week
- Living Off The Land (LOTL) persistent Reverse shell☆96Updated last year
- Crappy Golang code to list local listening ports and their associated processes.☆30Updated last year