material for exploit development
☆18May 3, 2019Updated 7 years ago
Alternatives and similar repositories for the-day-of-nightmares
Users that are interested in the-day-of-nightmares are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WhatHitMe is a Python3 tool which provides the possible Groups and their attributed Campaigns that may have attacked you in an incident, …☆18Jun 29, 2023Updated 2 years ago
- ☆28Jun 18, 2019Updated 6 years ago
- Adaptix C2 agent using Crystal Palace PIC linker and PICO module system☆82Mar 7, 2026Updated 2 months ago
- CVE-2020-1048 bypass: binary planting PoC☆32Aug 20, 2020Updated 5 years ago
- Cleanup of older MISP events can require some work until now☆28Apr 5, 2026Updated last month
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆127Jun 19, 2020Updated 5 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- A small collection of scripts that are useful for implementing Domain Fronting in an assessment.☆13Apr 25, 2019Updated 7 years ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- Create a Run registry key with direct system calls. Inspired by @Cneelis's Dumpert and SharpHide.☆79Feb 27, 2020Updated 6 years ago
- ☆56Dec 20, 2018Updated 7 years ago
- ☆20Feb 19, 2025Updated last year
- Deployment code for ashirt-server☆20Updated this week
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Crude C2 to Demonstrate Using QR Codes for Channel Traffic☆39Sep 21, 2020Updated 5 years ago
- OSEE Preparation☆192Feb 15, 2019Updated 7 years ago
- ☆37Apr 30, 2020Updated 6 years ago
- A collection of random bits of information common to many individual penetration tests, red teams, and other assessments☆115Nov 19, 2024Updated last year
- ☆19Sep 21, 2020Updated 5 years ago
- A tool that can be used to close network connections automatically with a given parameters☆14Apr 19, 2023Updated 3 years ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆33Aug 7, 2024Updated last year
- NightWriter is a modern real-time collaborative editing tool secured by end-to-end encryption.☆18Oct 16, 2021Updated 4 years ago
- WIP - A tutorial for OWASP ZAP☆13Feb 12, 2020Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Enumerate all visible network printers in local network☆19Jan 23, 2017Updated 9 years ago
- Windows Malware Probe of Concept☆21Jun 20, 2022Updated 3 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- ☆75Mar 11, 2026Updated 2 months ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆55Jan 18, 2020Updated 6 years ago
- An advanced multithreaded admin panel finder written in python.☆14Nov 6, 2020Updated 5 years ago
- small python server to store sensor weather data☆11Jan 23, 2019Updated 7 years ago
- Iterative AD discovery toolkit for offensive operations☆86Mar 16, 2020Updated 6 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆22Dec 22, 2020Updated 5 years ago
- A collection of Covid-19 related threat intelligence and resources.☆19Jul 17, 2020Updated 5 years ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆19Apr 6, 2024Updated 2 years ago
- ☆20Jun 25, 2024Updated last year
- DLL proxy load example using the Windows thread pool API, I/O completion callback with named pipes, and C++/assembly☆66Mar 19, 2024Updated 2 years ago
- Automatic function exporting and linking for fuzzing cross-architecture binaries.☆51Sep 9, 2018Updated 7 years ago
- Home router IDS solution with a Raspberry Pi 3. Dynamically resolves device name, manufacturer, and alerts user of Snort analytics throug…☆14Apr 4, 2019Updated 7 years ago