Manufacturing Truth since 1984
☆12Jul 16, 2024Updated last year
Alternatives and similar repositories for Minitrue
Users that are interested in Minitrue are comparing it to the libraries listed below
Sorting:
- ☆22Apr 11, 2025Updated 10 months ago
- Multi-agent system (MAS) hijacking demos☆42Updated this week
- PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD.☆55Feb 27, 2026Updated last week
- Cobalt Strike BOF to freeze EDR/AV processes and dump LSASS using WerFaultSecure.exe PPL bypass☆115Jan 29, 2026Updated last month
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- A Collection of templates that can be used for abusing window's AlwaysInstallElevated policy☆39Jan 4, 2023Updated 3 years ago
- POC for CVE-2020-13151☆38Aug 3, 2020Updated 5 years ago
- Small template engine☆12Nov 13, 2024Updated last year
- Versatile tool for managing wordlists☆11Jul 15, 2021Updated 4 years ago
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.☆11Apr 6, 2020Updated 5 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Cyber Security Challenge Australia 2014 Files☆18May 9, 2014Updated 11 years ago
- Python 3 module to talk to SimplyGo from Transit Link in Singapore☆11May 4, 2021Updated 4 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- Small tool to run reverse IP lookup for given IP, IP range or IP list☆13Jan 2, 2020Updated 6 years ago
- Workers-Framework: A simpler way to MultiTask in MicroPython☆12Jan 11, 2023Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- CTF collaboration tool for teams☆10Nov 10, 2017Updated 8 years ago
- NUS Greyhats CTF101 Web Security Lesson Material☆10Aug 22, 2015Updated 10 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Writing CUDA code in Python with the help of Numba. Some example code.☆10Jan 15, 2024Updated 2 years ago
- Action to detect if a secret is initially detected in a PR commit☆11Jun 19, 2023Updated 2 years ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆68Jan 11, 2023Updated 3 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- networkx graphs to ascii☆11Feb 8, 2026Updated 3 weeks ago
- ☆13Dec 24, 2023Updated 2 years ago
- babel macro for cats☆10Oct 4, 2018Updated 7 years ago
- Script and resources to execute shell commands using access to a PostgreSQL service☆13Oct 24, 2024Updated last year
- CTF designed for Middle School-aged kids☆12Oct 18, 2024Updated last year
- Test your javascript knowledge☆12Jan 10, 2018Updated 8 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆11Sep 3, 2023Updated 2 years ago
- ☆14Jul 21, 2024Updated last year
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- The "code" for squarectf.com☆13Jan 22, 2025Updated last year