The Hall of Ancient Exploitation Tools
☆16Oct 14, 2019Updated 6 years ago
Alternatives and similar repositories for valhalla
Users that are interested in valhalla are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- Shellcode Loader Implementing Indirect Dynamic Syscall , API Hashing, Fileless Shellcode retrieving using Winsock2☆13Jul 15, 2023Updated 2 years ago
- ARP Exploitation in Python☆11Feb 19, 2017Updated 9 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 6 years ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 4 years ago
- ☆11May 13, 2019Updated 6 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Apr 20, 2026Updated last week
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆68Apr 10, 2022Updated 4 years ago
- 🧿Join your two exe files☆13Jul 14, 2020Updated 5 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- ☆14Jun 5, 2019Updated 6 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Strong obfuscator for .NET files☆14Jan 22, 2020Updated 6 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Web shells for use in penetration testing☆42Mar 5, 2015Updated 11 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- This contains Helpful PYKD (Python Extension for Windbg) scripts☆49Mar 9, 2015Updated 11 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- Change hash for a signed pe☆18Jul 18, 2023Updated 2 years ago
- A curated collection of some cool Penetration scripts.☆15Feb 25, 2021Updated 5 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆37Dec 5, 2025Updated 4 months ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- ☆38Jul 14, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆20Feb 23, 2019Updated 7 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated last year
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆23Jul 11, 2021Updated 4 years ago
- Some PowerShell Stuff☆280Jun 15, 2022Updated 3 years ago