Obfuscate your Bash Code 🛡️
☆105Oct 11, 2024Updated last year
Alternatives and similar repositories for Blind-Bash
Users that are interested in Blind-Bash are comparing it to the libraries listed below
Sorting:
- detect trojans in an easy way 🛡️☆29Jul 25, 2018Updated 7 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A weaponized version of CVE-2018-9206☆62Oct 30, 2018Updated 7 years ago
- Clear all your logs in [linux/windows] servers 🛡️☆314Mar 25, 2021Updated 4 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆88May 8, 2018Updated 7 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- ☆99May 3, 2018Updated 7 years ago
- Terminator metasploit payload generator☆180May 29, 2018Updated 7 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- Powershell script to setup windows port forwarding using native netsh client☆124Aug 6, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- Security Tool to detect arp poisoning attacks☆54Apr 15, 2018Updated 7 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆141Apr 29, 2019Updated 6 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- New and Improved☆17May 7, 2016Updated 9 years ago
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.☆278Aug 24, 2023Updated 2 years ago
- Essential tool for finding blind injection attacks.☆49Feb 6, 2019Updated 7 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- yet another dirbuster☆18Jan 14, 2021Updated 5 years ago
- Centralized Firewall Control☆21Feb 5, 2018Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Apr 8, 2023Updated 2 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆165Aug 21, 2019Updated 6 years ago
- A bunch of useful SSH tools for powershell☆120Oct 24, 2018Updated 7 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- Encoded Reverse Shell Generator With Techniques To Bypass AV's☆146Aug 12, 2020Updated 5 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆61Aug 29, 2019Updated 6 years ago
- Check if a IP is from tor or is a malicious proxy☆57Feb 9, 2021Updated 5 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- A Python based backdoor that uses Steganography and a Cloud Image Service as a command and control server.☆26Sep 2, 2016Updated 9 years ago