This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based on country of origin, sex and how common the combination of surname and firstname can be.
☆13Feb 6, 2023Updated 3 years ago
Alternatives and similar repositories for genAvatar
Users that are interested in genAvatar are comparing it to the libraries listed below
Sorting:
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Mar 23, 2020Updated 5 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Apr 23, 2020Updated 5 years ago
- Example of async client/server sockets in .NET 5☆17Jun 9, 2021Updated 4 years ago
- Quick script to check for plagiarism between two documents☆16Nov 22, 2020Updated 5 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆19Aug 19, 2025Updated 6 months ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆23Feb 17, 2024Updated 2 years ago
- Use current thread token to execute command☆15Jan 27, 2021Updated 5 years ago
- ☆20Mar 21, 2024Updated last year
- want to remove sensitive data from photos or even view it? use autoexif to easily help you do that no more remembering syntaxs with this …☆39Apr 23, 2025Updated 10 months ago
- Burp Suite Certified Practitioner Exam Study☆18Feb 8, 2023Updated 3 years ago
- Impacket pre-compiled binaries☆18Jul 31, 2023Updated 2 years ago
- ☆24Oct 18, 2022Updated 3 years ago
- is a tool to automate and organize reconnaissance operations.☆24Sep 6, 2023Updated 2 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to exploit a system or server that ru…☆18Jan 15, 2019Updated 7 years ago
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Jul 6, 2019Updated 6 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 5 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆28Sep 18, 2024Updated last year
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- ☆25May 13, 2019Updated 6 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Sep 25, 2020Updated 5 years ago
- Many times I have asked myself how to maintain access to a compromised WordPress site for the sake of surveillance/data gathering/etc... …☆26May 30, 2024Updated last year
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated last year
- Parent Process ID Spoofing, coded in CGo.☆24Apr 21, 2025Updated 10 months ago
- what the fuck is this shit☆25Dec 14, 2015Updated 10 years ago
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆31Jan 14, 2023Updated 3 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.