The Hall of Ancient Exploitation Tools
☆16Oct 14, 2019Updated 6 years ago
Alternatives and similar repositories for valhalla
Users that are interested in valhalla are comparing it to the libraries listed below
Sorting:
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 9 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆14Nov 29, 2023Updated 2 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- A reverse TCP payload and listener both written in python3.☆30Jun 4, 2024Updated last year
- ☆11May 13, 2019Updated 6 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆66Apr 10, 2022Updated 3 years ago
- 🧿Join your two exe files☆12Jul 14, 2020Updated 5 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Feb 6, 2023Updated 3 years ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Strong obfuscator for .NET files☆14Jan 22, 2020Updated 6 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- This contains Helpful PYKD (Python Extension for Windbg) scripts☆49Mar 9, 2015Updated 11 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- A curated collection of some cool Penetration scripts.☆14Feb 25, 2021Updated 5 years ago
- Monitor 802.11 probe requests from a capture file or network sniffing!☆35Dec 5, 2025Updated 3 months ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆15Jul 6, 2025Updated 8 months ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- bunch of random stuff☆21Apr 11, 2020Updated 5 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆24Jul 11, 2021Updated 4 years ago
- Some PowerShell Stuff☆279Jun 15, 2022Updated 3 years ago
- A simple Mac-Address Sniffer based on tshark☆12Dec 27, 2018Updated 7 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago