Tharun-DV / bspwmLinks
☆20Updated last year
Alternatives and similar repositories for bspwm
Users that are interested in bspwm are comparing it to the libraries listed below
Sorting:
- ☆20Updated last year
- Mavoc is an Automated c2 Windows and Linux Pentesting Tool used to generate reverse shell and deploy attacking scripts to host machines…☆44Updated last year
- Pure Malware Development Resource Collections☆415Updated last year
- ⚠️ malware development☆671Updated last year
- Malware Development for Ethical Hackers, published by Packt☆430Updated 3 weeks ago
- Reverse Engineering and Malware Analysis Roadmap☆547Updated 3 months ago
- Cybersecurity research results. Simple C/C++ and Python implementations☆287Updated last week
- A curated compilation of extensive resources dedicated to bootkit and rootkit development.☆171Updated 5 months ago
- RunPE implementation with multiple evasive techniques (2)☆265Updated 3 months ago
- A POC of Windows Antivirus Tool written in python to detect ransomware , viruses , backdoors , payloads and completely removes it from…☆36Updated last year
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆445Updated 7 months ago
- Activate your windows machines in one step.☆115Updated last year
- 🧞♂️ malware analysis☆37Updated last year
- Automate your C2 creation with Azure Frontdoor and randomly generated options☆15Updated last year
- Config files for my GitHub profile.☆14Updated 2 weeks ago
- Shellcode IDE — makes developing and analyzing shellcode much more convenient.☆109Updated last month
- This comprehensive process injection series is crafted for cybersecurity enthusiasts, researchers, and professionals who aim to stay at t…☆427Updated 7 months ago
- ☆225Updated 9 months ago
- ☆56Updated last year
- RunPE implementation with multiple evasive techniques (1)☆377Updated 2 years ago
- This repo contains C/C++ snippets that can be handy in specific offensive scenarios.☆746Updated 11 months ago
- ☆55Updated 2 years ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆428Updated last week
- An List of my Powershell scripts, commands and Blogs for windows Red Teaming.☆466Updated 10 months ago
- Obfuscate the bytes of your payload with an association dictionary☆74Updated 2 months ago
- Impack-only implementation of WinRM protocol with support for NTLM and Kerberos auth☆112Updated 2 months ago
- Stealthy Linux Kernel Rootkit for modern kernels (6x)☆836Updated this week
- Sanctum is an experimental proof-of-concept EDR, designed to detect modern malware techniques, above and beyond the capabilities of antiv…☆483Updated this week
- kernel callback removal (Bypassing EDR Detections)☆209Updated last month
- Centralized resource for listing and organizing known injection techniques and POCs☆665Updated last month