SkyBulk / the-day-of-nightmaresView external linksLinks
material for exploit development
☆18May 3, 2019Updated 6 years ago
Alternatives and similar repositories for the-day-of-nightmares
Users that are interested in the-day-of-nightmares are comparing it to the libraries listed below
Sorting:
- ☆28Jun 18, 2019Updated 6 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- Deployment code for ashirt-server☆20Oct 15, 2025Updated 4 months ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Clipboard access notification inspired by iOS 14☆22Jun 30, 2020Updated 5 years ago
- ☆127Jun 19, 2020Updated 5 years ago
- OSEE Preparation☆192Feb 15, 2019Updated 7 years ago
- ☆37Apr 30, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 5 years ago
- CVE-2020-1048 bypass: binary planting PoC☆33Aug 20, 2020Updated 5 years ago
- ☆83Jan 25, 2017Updated 9 years ago
- ☆10Oct 9, 2024Updated last year
- Iterative AD discovery toolkit for offensive operations☆85Mar 16, 2020Updated 5 years ago
- Dump macOS 1.8+ password hashes to a hashcat-compatible format☆14May 29, 2022Updated 3 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- Deflate64 - Decripting Base 64 strings, decompress content (sploits Power Shell)☆10Oct 30, 2017Updated 8 years ago
- ☆57Dec 20, 2018Updated 7 years ago
- A Crude C2 to Demonstrate Using QR Codes for Channel Traffic☆39Sep 21, 2020Updated 5 years ago
- A collection of malware samples caught by DIONAEA Honeypot☆11May 29, 2019Updated 6 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Open-source drop-in replacement for IOUlive (written in C)☆24Dec 4, 2011Updated 14 years ago
- Assembler tinkering happens here. All your bytes are belong to us.☆13May 6, 2017Updated 8 years ago
- Poc of using youtube comments for C2 communications☆10Jul 6, 2021Updated 4 years ago
- The .NET equivalent of Window's rundll.exe/rundll32.exe☆11Oct 24, 2020Updated 5 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆14Jul 18, 2019Updated 6 years ago
- Notepad++ Syntax Highlighting for Languages Used by Cyber Security Professionals☆14May 31, 2020Updated 5 years ago
- A Collection of all things Security☆11Sep 24, 2020Updated 5 years ago
- ☆40Jan 12, 2022Updated 4 years ago
- Import and export x64dbg comments/breakpoints/labels/bookmarks in Cutter☆16Apr 2, 2021Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's Don't Forget Your Base release. Contains Equation group's collection of tools primar…☆18Jan 29, 2018Updated 8 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year