ansemjo / truepolyglotLinks
Create polyglot files, which are valid PDF and ZIP simultaneously. See POC||GTFO 07. (forked from git.hackade.org)
☆67Updated 3 years ago
Alternatives and similar repositories for truepolyglot
Users that are interested in truepolyglot are comparing it to the libraries listed below
Sorting:
- ☆45Updated 4 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 2 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- ☆27Updated 3 years ago
- EAP_buster is a simple bash script that lists what EAP methods are supported by the RADIUS server behind a WPA-Enterprise access point☆79Updated last year
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆135Updated last year
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Updated 3 years ago
- The Cloud Blocker☆107Updated 6 months ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆149Updated 2 months ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆25Updated 5 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- A CLI tool which can be used to inject JavaScript into arbitrary Chrome origins via the Chrome DevTools Protocol☆44Updated 4 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆82Updated 2 weeks ago
- DNS File EXfiltration☆46Updated last year
- Posts about different topics☆38Updated last week
- DES Rainbow Table Online Phase☆25Updated 8 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆87Updated 4 years ago
- ☄️ go-out - A Golang egress buster.☆129Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- A Red Team tool for exfiltrating sensitive data from Confluence pages.☆112Updated 2 years ago
- A tool to tunnel TCP traffic over WinRM☆18Updated 4 years ago
- DNS server for pentesters☆49Updated 3 years ago
- Damn Vulnerable CICS Application☆27Updated last year
- Markov-chains for linguistically-correct password cracking☆62Updated 3 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- Machine-learn password mangling rules☆113Updated 2 years ago
- ☆108Updated 3 years ago