SomajitDey / gibberishLinks
Git and Bash Based Encrypted Remote Interactive Shell (GiBBERISh). For when you cannot use SSH.
☆12Updated 4 years ago
Alternatives and similar repositories for gibberish
Users that are interested in gibberish are comparing it to the libraries listed below
Sorting:
- Local Privilege Escalation Miner☆27Updated 3 years ago
- ☆16Updated last month
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Detect and remove the presence of canary tokens☆20Updated last year
- masscan with exclusive excludes☆56Updated last year
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆19Updated 5 months ago
- ☆12Updated 4 years ago
- Monitor hashcat potfile for statistics☆8Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- ☆18Updated last year
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- ☆12Updated 2 years ago
- ☆14Updated 3 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- Working repo used to experiment with various languages as it relates to offensive security & evasion.☆31Updated 11 months ago
- Password Transformation Tool (ptt) is a versatile utility designed for password cracking.☆27Updated last month
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 7 months ago
- ☆11Updated last month
- Rust-based password mutator for brute force attacks☆13Updated 2 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- Open YARA scan- and search engine☆23Updated 3 months ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆19Updated 3 weeks ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆38Updated 3 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Configurable, Community driven, HTTP C2 Profile☆18Updated last week
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Repository of Volatility3 plugins☆22Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆35Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- NanoDumpInject from https://s3cur3th1ssh1t.github.io/Reflective-Dump-Tools/ , minor edits with a few syscalls☆11Updated 2 years ago