SynthetixLabs / USDT-Flash-Creator
USDT-Flash-Creator, an innovative tool designed for advanced USDT token operations.π
β9Updated 5 months ago
Alternatives and similar repositories for USDT-Flash-Creator:
Users that are interested in USDT-Flash-Creator are comparing it to the libraries listed below
- β66Updated last week
- USDT-Flash-Creator, an innovative tool designed for advanced USDT token operations.πβ15Updated 5 months ago
- MAC Address brute forcing tool, used to bypass MAC based filteringβ14Updated 3 years ago
- How to retrive all information about Windows Extended Rights via LDAPβ10Updated 11 months ago
- ExplorerUACStealer it's a malware that steal credentials provided by users in UAC Auth in explorer using API Hooking with Detours in C++β¦β15Updated last year
- Official repository for the Advanced Software Exploitation (ASE) courseβ20Updated 6 years ago
- β16Updated last month
- Exploit for CVE-2024-3273, supports single and multiple hostsβ13Updated 11 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.β12Updated last year
- β10Updated 4 months ago
- module for certexfilβ15Updated 2 years ago
- A C# Tool to gather information about email breachesβ14Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can lβ¦β16Updated 3 years ago
- β17Updated 4 years ago
- web based c2 π΄ββ οΈβ13Updated 7 months ago
- Random Tips and Writeups.β13Updated 6 years ago
- WikiLeaks Vault 7 CIA Hacking Toolsβ11Updated 7 years ago
- Perform file-based malware scan on your on-prem servers with AWSβ12Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requestsβ12Updated 9 months ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBinβ16Updated 4 years ago
- Multithreaded password cracker for SHA1, SHA256, SHA384, SHA512, and MD5 hash functions, coded in C#. This tool allows you to test the stβ¦β9Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.β16Updated 11 months ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementationβ12Updated 2 years ago
- β16Updated 6 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck frameworkβ12Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based oβ¦β13Updated 2 years ago
- Process injection via KernelCallbackTableβ14Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposesβ21Updated 4 years ago
- Public exploitsβ14Updated 6 years ago
- Shadow Strike is a hacking framework that aids in information gathering, payload generation, payload delivery, and website exploitation.β8Updated 3 years ago