Linux startup analyzer
☆66Jun 2, 2025Updated 9 months ago
Alternatives and similar repositories for RCLocals
Users that are interested in RCLocals are comparing it to the libraries listed below
Sorting:
- An evil bit backdoor for iptables☆55Apr 14, 2021Updated 4 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 7 years ago
- Asus AsIO2 Local Privilege Escalation exploit (based on ReWolf's MSI exploit)☆14Apr 5, 2020Updated 5 years ago
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ☆23Nov 29, 2023Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- WIP Post-exploitation framework tailored for hypervisors.☆50Nov 16, 2023Updated 2 years ago
- A More Comfortable (remote) SHell with full pty support and both reverse / bindport connection mode.☆30May 12, 2013Updated 12 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Aug 18, 2021Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Router socks. One port socks for all the others.☆69May 22, 2024Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- BadExclusions is a tool to identify folder custom or undocumented exclusions on AV/EDR☆21Feb 8, 2024Updated 2 years ago
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Sep 2, 2021Updated 4 years ago
- VBScript minifier☆25Jan 9, 2026Updated last month
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 3 years ago
- ☆37Dec 27, 2021Updated 4 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Jun 3, 2021Updated 4 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆98Sep 28, 2025Updated 5 months ago
- Searching .evtx logs for remote connections☆24Jul 6, 2023Updated 2 years ago
- Extension functionality for the NightHawk operator client☆26Nov 3, 2023Updated 2 years ago
- powershell tool for VM evasion☆41Oct 2, 2020Updated 5 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Sep 29, 2022Updated 3 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Linkedin Employee Profile Scrapper (Python3 version)☆12Jul 26, 2021Updated 4 years ago
- ☆21Jan 7, 2019Updated 7 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- ☆14May 20, 2019Updated 6 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- An exotic service bruteforce tool.☆13Apr 12, 2025Updated 10 months ago
- A container-based framework to enable the integration of mobile components in security training platforms☆185Sep 12, 2022Updated 3 years ago
- Convert shellcode into different formats!☆358Jan 24, 2023Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆47Dec 6, 2023Updated 2 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆31Mar 21, 2023Updated 2 years ago