SafeBreach-Labs / cachetalkView external linksLinks
Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching
☆38Jul 14, 2017Updated 8 years ago
Alternatives and similar repositories for cachetalk
Users that are interested in cachetalk are comparing it to the libraries listed below
Sorting:
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Apr 23, 2020Updated 5 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Automatic detection of hashing algorithms☆20Jun 18, 2016Updated 9 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Aug 5, 2016Updated 9 years ago
- SubShell is a python command shell used to control and execute commands through HTTP requests to a webshell. SubShell acts as the interfa…☆75Nov 6, 2016Updated 9 years ago
- ☆19May 31, 2017Updated 8 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 6 years ago
- Swift code to parse the quarantine history database, Chrome history database, Safari history database, and Firefox history database on ma…☆15Dec 3, 2020Updated 5 years ago
- A light weight Python web framework.☆10Apr 6, 2016Updated 9 years ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 6 months ago
- ☆10Feb 18, 2016Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- ☆85May 19, 2015Updated 10 years ago
- XXE attack tool☆31Feb 20, 2016Updated 9 years ago
- A simple Python client for PhotoBackup☆12Jan 14, 2016Updated 10 years ago
- ☆13Apr 11, 2018Updated 7 years ago
- Captive Portal Evasion Tool☆15Sep 4, 2016Updated 9 years ago
- Catalog Red Team techniques that cause popups in various macOS versions☆15Nov 18, 2024Updated last year
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- TesserCap is a GUI based, point and shoot CAPTCHA analysis tool☆18Jul 8, 2012Updated 13 years ago
- Ayaabu is a funny trick that fake the installation of many Antivirus☆12Jul 6, 2016Updated 9 years ago
- OSINT Resources for Politics☆14Aug 13, 2018Updated 7 years ago
- Encode binary as English text over HTTP(s)☆30Aug 25, 2023Updated 2 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Golang CLI binary used for installing and managing Ghostwriter☆19Feb 6, 2026Updated last week
- ☆13Jul 24, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 4 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago