☆25Jan 12, 2023Updated 3 years ago
Alternatives and similar repositories for PythonShellcode
Users that are interested in PythonShellcode are comparing it to the libraries listed below
Sorting:
- Tool to aid in dumping LSASS process remotely☆42Sep 23, 2025Updated 5 months ago
- custom impacket mssqlclient☆26Sep 16, 2023Updated 2 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- Microsoft Entra ID (Azure AD) Unauthenticated Enumeration☆67Feb 5, 2026Updated 3 weeks ago
- ☆41Jan 10, 2020Updated 6 years ago
- Shellcode reflective DLL injection in Rust☆27Dec 26, 2025Updated 2 months ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.☆22May 16, 2018Updated 7 years ago
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆43Aug 10, 2025Updated 6 months ago
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- Rebuild of portspoof in GO with additional features.☆29Oct 24, 2025Updated 4 months ago
- Reverse-HTTP Redirector via DigitalOcean Apps Platform☆31Aug 16, 2023Updated 2 years ago
- Exploit of RealVNC VNC Server☆27Oct 18, 2022Updated 3 years ago
- ☆72Mar 31, 2022Updated 3 years ago
- The CAPTCHA-resilient contact scraper.☆47Nov 18, 2025Updated 3 months ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- Load and execute a common object file format (COFF) in the current process☆32Mar 9, 2024Updated last year
- A python library to create BloodHound OpenGraphs☆53Feb 4, 2026Updated 3 weeks ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 2 months ago
- A small tool I made to dump the export table of PE files. The primary use case was intended for use within DLL proxying.☆71Aug 16, 2022Updated 3 years ago
- A tiny macro library for protecting sensitive strings in compiled binaries☆40Oct 8, 2024Updated last year
- Timestomping module: overwrite file create/modify times in .NET (no pinvoke)☆27Dec 13, 2021Updated 4 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- ☆38Mar 28, 2025Updated 11 months ago
- Find Inbound Email Domains☆35Dec 21, 2023Updated 2 years ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆42Jan 6, 2026Updated last month
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆41May 31, 2024Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆223May 19, 2022Updated 3 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated last week
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- Validates priv escalation of AD trusts☆48Apr 1, 2025Updated 11 months ago
- Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.☆232Dec 18, 2025Updated 2 months ago
- ☆52Jul 8, 2025Updated 7 months ago
- A simple Python script to do quick, targeted recon of a given domain.☆70Apr 17, 2025Updated 10 months ago
- ☆10Nov 13, 2021Updated 4 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 9 months ago