The Hall of Ancient Exploitation Tools
☆16Oct 14, 2019Updated 6 years ago
Alternatives and similar repositories for valhalla
Users that are interested in valhalla are comparing it to the libraries listed below
Sorting:
- Nano meterpreter shell based on TinyMet☆28Aug 27, 2016Updated 9 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- ☆11May 13, 2019Updated 6 years ago
- Native Android software for dumping memory from Android processes☆14Sep 18, 2014Updated 11 years ago
- A small utility to run raw code chunks in the executable memory area.☆15Feb 6, 2015Updated 11 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Simple Script "NativePayload_ARP2.sh" for Sending DATA via ARP Bcast Traffic to all systems in (LAN) by "Vid" tag☆13Jun 5, 2023Updated 2 years ago
- A curated collection of some cool Penetration scripts.☆14Feb 25, 2021Updated 5 years ago
- Generic plugin based web application security fuzzing for anomalies by Slándáil Research Limited☆13Feb 13, 2024Updated 2 years ago
- Exploits Scripts and other tools that are useful during Penetration-Testing or Red Team engagement☆65Apr 10, 2022Updated 3 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 10 months ago
- Simple decrypter for Java AdWind, jRAT, jBifrost trojan☆17Jan 17, 2017Updated 9 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- Windows Stagers to circumvent restrictive network environments☆69Sep 23, 2024Updated last year
- ☆20Feb 23, 2019Updated 7 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- Self defense post module for metasploit☆17Aug 30, 2019Updated 6 years ago
- Strong obfuscator for .NET files☆14Jan 22, 2020Updated 6 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@ …☆21May 29, 2018Updated 7 years ago
- A very weird RAT☆19Aug 11, 2022Updated 3 years ago
- Repository housing my 'man in the middle' project dealing with mitmproxy (Defeating HTTPS/HSTS, JS injection, DNS spoofing)☆19Jun 19, 2020Updated 5 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- This contains Helpful PYKD (Python Extension for Windbg) scripts☆49Mar 9, 2015Updated 10 years ago
- ☆93Nov 1, 2018Updated 7 years ago
- Several self-defense shellcodes☆23Jul 16, 2019Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- Simple C++ cryptolocker Blowfish CBC☆18Apr 13, 2019Updated 6 years ago