GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.
☆11Nov 24, 2023Updated 2 years ago
Alternatives and similar repositories for GeoWordlists
Users that are interested in GeoWordlists are comparing it to the libraries listed below
Sorting:
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- An In-memory Embedding of CPython☆31May 24, 2021Updated 4 years ago
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- A havoc UI python module to help in reporting and vulnerabilities to exploit on an internal network.☆14Oct 31, 2023Updated 2 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- A collection of sample code used in some experiments with Sliver C2☆16Mar 28, 2023Updated 2 years ago
- A Python script to extract the list of users of a GiTea instance, unauthenticated or authenticated.☆15Feb 11, 2025Updated last year
- BOF for C2 framework☆44Nov 9, 2024Updated last year
- An attempt to detect malware using Opcodes and Hexadecimal Instructions.☆32Sep 6, 2021Updated 4 years ago
- DJI Drone Control Hijacking☆41Sep 13, 2023Updated 2 years ago
- An easy way to convert BloodHound output files into data that can be imported into reporting software like Dradis and Plextrac. Built by …☆18Oct 15, 2020Updated 5 years ago
- Example of using Sleep to create better named pipes.☆41Jul 25, 2023Updated 2 years ago
- Microsoft365 Device Code Phishing Framework☆39Sep 4, 2021Updated 4 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- ☆14Dec 5, 2024Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆21Nov 28, 2025Updated 3 months ago
- Dll injection through code page id modification in registry. Based on jonas lykk research☆17Jun 18, 2022Updated 3 years ago
- A .NET 4.8 application to retrieve delivr.to emails from Microsoft Outlook via COM☆20Jul 19, 2025Updated 7 months ago
- A standalone tool for logging shell commands to GhostWriter automatically☆19Aug 24, 2024Updated last year
- ☆18Apr 15, 2024Updated last year
- A simple, quick, and dirty websocket shell for PowerShell.☆20Jun 5, 2017Updated 8 years ago
- Unpacker for donut shellcode☆21Jun 20, 2020Updated 5 years ago
- Rust crate to simplify Windows ACL operations☆19Jun 9, 2023Updated 2 years ago
- PoC XLL builder in Python/Nim☆49Nov 21, 2022Updated 3 years ago
- Backend for Nuclear Pond☆21Dec 7, 2023Updated 2 years ago
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated 11 months ago
- Library of BOFs to interact with SQL servers☆23Apr 9, 2025Updated 10 months ago
- stop any process from looking into your process by hooking.☆21Apr 2, 2024Updated last year
- Next gen process injection technique☆54Jul 9, 2020Updated 5 years ago
- Asynchronous named pipe module for PowerShell☆21May 30, 2016Updated 9 years ago
- Shellcode Injector that obtains system call opcodes using the Halo's Gate method to evade EDR Hooks.☆20Feb 2, 2022Updated 4 years ago
- A live video stream license plate detector based on OpenALPR☆22Oct 1, 2020Updated 5 years ago
- a port of privkit bof for havoc☆23Dec 8, 2023Updated 2 years ago
- Playing with PE's and Building Structures by Hand☆22Apr 21, 2022Updated 3 years ago
- Reports on Driver, LSASS and other security services mitigations☆34Aug 18, 2025Updated 6 months ago
- A simple reverse ssh/proxy implant PoC for *nix systems.☆57Jul 5, 2024Updated last year
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago