🌒 Shell command obfuscation to avoid detection systems
☆122Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for volana
Users that are interested in volana are comparing it to the libraries listed below
Sorting:
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆29Apr 3, 2025Updated 11 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Apr 27, 2024Updated last year
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated 2 weeks ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Jun 22, 2024Updated last year
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Jan 26, 2026Updated last month
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- CVE-2022-24990 TerraMaster TOS unauthenticated RCE via PHP Object Instantiation☆14Apr 25, 2022Updated 3 years ago
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Aug 6, 2023Updated 2 years ago
- Stealth dropper executing remote binaries without dropping them on disk .(HTTP3 support, ICMP support, invisible tracks, cross-platform,.…☆205Jul 2, 2024Updated last year
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆137May 7, 2025Updated 10 months ago
- 使得Cobaltstrike支持Atexec☆89Jun 30, 2020Updated 5 years ago
- ☆31Dec 5, 2024Updated last year
- ☆13Mar 1, 2024Updated 2 years ago
- A small go harness that uses Ollama to orchestrate LLMs in a restricted process flow☆16Sep 10, 2024Updated last year
- LPE of CVE-2024-26230☆23Sep 1, 2024Updated last year
- Load CLR to get RWX 通过加载clr在自身内存中产生rwx空间☆22Sep 28, 2022Updated 3 years ago
- 一个简单的指纹识别小工具☆21Oct 23, 2023Updated 2 years ago
- Allow exporting the information downloaded with sqlmap to a relational Database like Postgres and sqlite☆44Sep 12, 2024Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40May 7, 2023Updated 2 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合☆10Jul 30, 2022Updated 3 years ago
- PowerShell version of Fail2Ban☆13Oct 10, 2019Updated 6 years ago
- exp for useful vuln☆12Jul 9, 2021Updated 4 years ago
- Proof Of Concept code for OctoberCMS Auth Bypass CVE-2021-32648☆12Jan 14, 2022Updated 4 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- Analyse binaries for missing security features, information disclosure and more...☆87Aug 7, 2023Updated 2 years ago
- Quicky serve files over http or https using flask.☆35Jan 26, 2025Updated last year
- geacon:简单适配了一个profile配置文件,可直接拿来修改使用,用于cs上线linux.☆161Aug 3, 2022Updated 3 years ago
- With the help of this automated script, you will never lose track of recently released CVEs.☆52Feb 19, 2022Updated 4 years ago
- 窃取当前用户的ssh,sudo密码☆69Apr 16, 2023Updated 2 years ago
- CobaltStrike Malleable Profile☆22May 16, 2022Updated 3 years ago
- Tools for analyzing EDR agents☆278Jun 10, 2024Updated last year
- A little implant which SSH's back with a shell☆39Feb 1, 2022Updated 4 years ago
- Scan for evidence of CVE-2021-30860 (FORCEDENTRY) exploit☆11Sep 21, 2021Updated 4 years ago
- BLE based C2 for Hak5's Bash Bunny☆19Oct 31, 2023Updated 2 years ago
- 使用Go语言开发的Linux权限审计工具☆13Jun 15, 2022Updated 3 years ago
- APK Infrastructure Investigator☆64Jun 20, 2023Updated 2 years ago
- A simple C2 using Google Translate Webpage for data evasion☆12Jan 30, 2023Updated 3 years ago