Getting Envisioncollision to actually work.
☆15Oct 19, 2017Updated 8 years ago
Alternatives and similar repositories for envisioncollision
Users that are interested in envisioncollision are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-e…☆334Jun 23, 2018Updated 7 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆29Sep 13, 2018Updated 7 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Modules created by Nettitude for Metasploit☆11Jun 20, 2018Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Jun 10, 2017Updated 8 years ago
- Anti-AV compilation☆44Oct 4, 2013Updated 12 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Cross platform package manager.☆15Dec 4, 2025Updated 3 months ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg☆1,989Apr 14, 2017Updated 8 years ago
- Scan MSSQL databases for payment card data without relying on key words☆19Apr 10, 2017Updated 8 years ago
- An exploratory look at Rust game engines using the Boids life program☆10Dec 23, 2021Updated 4 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Aug 25, 2016Updated 9 years ago
- exploit of smt proxyoverflow bug, i.e. CVE-2018–10376☆10May 4, 2018Updated 7 years ago
- Proxy scraper for proxychains☆43Oct 10, 2020Updated 5 years ago
- WGPU based 2D game engine made on stream☆12Apr 11, 2023Updated 2 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Are we extending other languages yet? (FFI)☆17May 16, 2025Updated 10 months ago
- Converts Half-WPA handshake to hashcat☆19Oct 29, 2018Updated 7 years ago
- Decompiled source code of GhostCtrl. It’s not the original source code☆10Jul 26, 2017Updated 8 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19May 27, 2017Updated 8 years ago
- Converts JSON objects to HTML Tables - because your users deserve pretty HTML, not a JSON blob☆15Jun 16, 2017Updated 8 years ago
- ☆22Jul 24, 2021Updated 4 years ago
- Command to run a dev-server, build etc. with OpenPGP. On top of webpack.☆11Aug 11, 2021Updated 4 years ago
- 🌴 Small javascript utilities.☆14Nov 28, 2023Updated 2 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- maps are everything.☆10Jul 3, 2025Updated 8 months ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- Node JS code for a set of Alexa voice skills designed to assist hackers and developers with common tasks☆56Mar 6, 2019Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Switchboard Security & Privacy Plug☆16Mar 2, 2026Updated 3 weeks ago
- Easily serve HTTP and DNS keys for proper payload protection☆59Nov 10, 2018Updated 7 years ago
- Audible Electromagnetic Interference Detector - Model ET-1☆14Mar 7, 2020Updated 6 years ago
- SL5_AHK_Refactor_engine is a developer productivity engine for ahk developers with scite4ahk☆12Mar 21, 2018Updated 8 years ago