ViRb3 / poweruser
πͺ Collection of tips, tricks and scripts for becoming a true poweruser
β27Updated last year
Related projects β
Alternatives and complementary repositories for poweruser
- This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. Use it to copy SYβ¦β15Updated 7 years ago
- The ORIGINAL decrypted copies of the Shadow Broker's equation_drug release. Contains Equation group's espionage DLL implants library. Useβ¦β18Updated 6 years ago
- Offensive Android Kernel on Steroids - Shuriken is an Android kernel for Oneplus 5/5T which supports multiple features for pentesting.β27Updated 5 years ago
- Launch a Windows EXE file with this EXE file (application filter evasion)β11Updated 7 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.β15Updated 10 years ago
- A RAT, script that controls other pcs remotly, for educational purposes onlyβ13Updated 4 months ago
- Open Secure-K OS is an operating system booting from a USB key in which you can safely create and store your personal and private data. β¦β31Updated 7 months ago
- Monitor Files and Folders for Changes in Real Time .β10Updated 5 years ago
- Dump Windows registry hives as text.β15Updated 5 years ago
- research chrome stored databases - dumping all urlsβ34Updated 6 years ago
- Various Topicsβ15Updated 2 years ago
- Find all cool documents on GOV and Info sitesβ18Updated 5 years ago
- Collection of cracked malwareβ14Updated 5 years ago
- Finder Predator The Thief botnet panelβ7Updated 5 years ago
- A simple AES malware crypterβ16Updated 6 years ago
- Alienvault Labs Projects Random Stuffβ16Updated 11 years ago
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.β16Updated 7 years ago
- β19Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systemsβ26Updated 6 years ago
- BurpDroid is a web application debugging tool for Android and is often used for checking web application security. Itβs a proxy-based tooβ¦β10Updated 3 years ago
- fully automated c# reverse shells with automated ssh tunnelingβ5Updated 3 years ago
- Collection of F-Droid repositoriesβ15Updated 11 months ago
- SIP hacking tools and scriptsβ23Updated 3 years ago
- Cryptocurrencies related Security resourcesβ14Updated last year