A proof-of-concept reverse-shell written in rust.
☆32Apr 26, 2019Updated 6 years ago
Alternatives and similar repositories for tetanus
Users that are interested in tetanus are comparing it to the libraries listed below
Sorting:
- Experimenting with destructive file attacks in Go☆19May 20, 2019Updated 6 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- More bind and reverse shells! This time written in Rust.☆52Sep 27, 2022Updated 3 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- ShellOrd is a C2 (Command & Control) framework cross-platform and agent written in Rust & Java☆15Sep 2, 2024Updated last year
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆66Oct 17, 2023Updated 2 years ago
- Starts an ngrok TCP tunnel and notifies you of the URL. Perfect for automated remote SSH connections.☆14Jan 24, 2021Updated 5 years ago
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆25Dec 26, 2024Updated last year
- A golang CLI to setup honey pots https://en.wikipedia.org/wiki/Honeypot_(computing)☆16Jul 19, 2020Updated 5 years ago
- Menu driven wordlist generator in C++☆19Jan 2, 2022Updated 4 years ago
- rshc: Compile shell script to Rust code and binary.☆21Feb 6, 2026Updated 3 weeks ago
- RustHunter is a modular incident response framework based on Rust and Ansible to build and compare environmental baselines.☆18Nov 12, 2025Updated 3 months ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.☆23Sep 29, 2025Updated 5 months ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Jun 2, 2018Updated 7 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- ☆27Feb 6, 2022Updated 4 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Sep 2, 2018Updated 7 years ago
- Various Crypter Project☆55Feb 26, 2014Updated 12 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Oct 28, 2020Updated 5 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Feb 21, 2025Updated last year
- Automatically spin up infra for phishing☆64Feb 1, 2020Updated 6 years ago
- ELF packer/crypter that aims to create hardened and stealthy troyans☆58Dec 25, 2021Updated 4 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆33Mar 2, 2021Updated 5 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- ☆27Mar 5, 2023Updated 3 years ago
- Nim Payload Generation☆62Oct 9, 2023Updated 2 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- Remotely accessible Tor hidden service deployment suite☆24Dec 7, 2018Updated 7 years ago
- Quick python script to replace the NtAPI functions within SysWhispers' assembly and header files with random strings☆28May 30, 2022Updated 3 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- A Win32 PE/Executable Crypter that employs on the fly encryption & decryption of memory☆33Feb 14, 2014Updated 12 years ago
- Web application created using Streamlit to host an intelligent salary predictor. The project returns the position of the user in this par…☆13Jul 29, 2024Updated last year
- ☆10Aug 4, 2022Updated 3 years ago
- 💙 tenable.sc / nessus / acas powershell module☆39Nov 30, 2021Updated 4 years ago
- Generate a Employee monthly payslip download as pdf and send to their mail☆10Sep 18, 2022Updated 3 years ago