Orange-Cyberdefense / leHACK-2022View external linksLinks
☆17Jul 1, 2022Updated 3 years ago
Alternatives and similar repositories for leHACK-2022
Users that are interested in leHACK-2022 are comparing it to the libraries listed below
Sorting:
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆15Jul 10, 2025Updated 7 months ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- This is a automation of installing some important tools which all Linux & Termux users needs. Now only some tools are available. Try to g…☆17Oct 5, 2020Updated 5 years ago
- ☆20May 1, 2023Updated 2 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- ☆27Sep 3, 2022Updated 3 years ago
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- Binary and CrackMapExec module to impersonate tokens on a windows machine☆46Jul 9, 2022Updated 3 years ago
- Fully FUD keylogger that can bypass windows 11 & windows 10 defender protection and all kinds of Antivirus protections also.☆20Oct 9, 2021Updated 4 years ago
- A small tool to find admin panel of the website☆19Nov 21, 2022Updated 3 years ago
- ☆27May 1, 2023Updated 2 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Instagram Bruteforce For Hacking Instagram Accounts☆17Apr 4, 2020Updated 5 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- NanoCore 1.0.3.0 RAT☆26Jul 14, 2021Updated 4 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Aug 11, 2023Updated 2 years ago
- Ease and assist the compromise of an Active Directory environment.☆31Sep 17, 2021Updated 4 years ago
- Top10REMOTEACCES FOR KALI LINUX 2018.1 Windows+Android☆30Apr 15, 2018Updated 7 years ago
- A small and an efficient tool to find SQL injection vulnerability in a websites.☆27Nov 21, 2022Updated 3 years ago
- A simple program to quickly and efficiently check accounts on snapchat,☆11Feb 5, 2023Updated 3 years ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- Gallery Hack Form Our Team☆11Aug 10, 2023Updated 2 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- Simple C# Keylogger (Keyboard Layout)☆66Jul 22, 2019Updated 6 years ago
- Latest FUD GMail phishing webpage generator☆30Jun 27, 2020Updated 5 years ago
- Tools I use on red team engagements and more☆33Mar 14, 2024Updated last year
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 4 years ago
- recover Firefox and more browsers logins☆49Nov 23, 2021Updated 4 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- ☆10Jul 16, 2024Updated last year
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A python based script to update DNS entries in ADIDNS☆43Apr 12, 2024Updated last year
- A library to produce cybersecurity exploitation routes (exploit flows). Inspired by TensorFlow.☆37Jul 27, 2023Updated 2 years ago
- Collection of shellcode injection techniques packed in a D/Invoke weaponized DLL☆32Oct 30, 2021Updated 4 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago