TotallyNotAHaxxer / CasterLinks
Caster - The ECP manipulator for Roku and the ghost in the Cast (Google Chromecast)
☆14Updated last year
Alternatives and similar repositories for Caster
Users that are interested in Caster are comparing it to the libraries listed below
Sorting:
- Cosas copypaste☆14Updated 2 years ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆118Updated 2 years ago
- The Havoc Framework☆63Updated 3 years ago
- A simple script to automate systemd backdoor☆38Updated 3 years ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆15Updated 2 years ago
- notes and ramblings from my OSCP/PenTesting Studies☆96Updated 2 years ago
- my kali desktop setup☆322Updated last year
- Scripts for offensive security☆179Updated 8 months ago
- Proof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.☆348Updated last year
- Hardware Hacking ES Comunidad☆128Updated last year
- PyRAT is a powerful CTF (Capture The Flag) rootkit designed to be used in cybersecurity competitions and educational settings. It provide…☆29Updated 9 months ago
- A Python3 based C2 server to make life of red teamer a bit easier. The payload is capable to bypass all the known antiviruses and endpoi…☆529Updated 2 years ago
- Virtualized WiFi pentesting laboratory without the need for physical Wi-Fi cards, using mac80211_hwsim. Docker version of WiFiChallenge L…☆358Updated last week
- Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas☆28Updated 11 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆68Updated last year
- Generate FUD backdoors☆262Updated 2 years ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆65Updated 3 years ago
- Testing POC for use cases☆25Updated last year
- This is for Ethical Use only. The default automated binaries created are all burned. I have added the script to the repo to modify certai…☆446Updated 8 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker …☆284Updated 11 months ago
- CVE-2024-21413 PoC for THM Lab☆212Updated last year
- Repo containing cracked red teaming tools.☆220Updated 3 months ago
- This repository contains various snippets I use in my malware, command and control servers, payloads, and much more. Hopefully it can hel…☆213Updated 6 months ago
- Create a fully undetectable backdoor with simple steps.☆77Updated 3 years ago
- Koth - TryHackMe Tricks☆190Updated 2 years ago
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated last year
- Demonized Shell is an Advanced Tool for persistence in linux.☆432Updated last year
- This repo contains scripts to query dehashed.com and crack the returned hashes which will then save all cleartext passwords and hashes to…☆182Updated last year
- A revamped and updated version of my original OneRuleToRuleThemAll hashcat rule☆589Updated last year
- A solution to create obfuscated reverse shells for PowerShell.☆83Updated 3 years ago