Code from my Youtube channel "Asim Code".
☆13Feb 4, 2025Updated last year
Alternatives and similar repositories for Asim-Code-Youtube-Channel-Code
Users that are interested in Asim-Code-Youtube-Channel-Code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆21Feb 16, 2021Updated 5 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- ☆22Dec 22, 2022Updated 3 years ago
- All binaries, tools,wordlists and tutorials you need to pass eCPPTv2 - For Free!☆26Jan 28, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆36Feb 14, 2023Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆38Jul 9, 2020Updated 5 years ago
- A simple script to automate systemd backdoor☆71Dec 19, 2022Updated 3 years ago
- Chrome Credential Stealer that reports to Discord through Webhooks☆39Mar 11, 2022Updated 4 years ago
- Payload for DLL sideloading of the OneDriveUpdater.exe, based on the PaloAltoNetwork Unit42's blog post☆100Oct 13, 2022Updated 3 years ago
- CVE-2007-2447 - Samba usermap script☆61Aug 16, 2020Updated 5 years ago
- ☆67Apr 5, 2022Updated 4 years ago
- Create a fully undetectable backdoor with simple steps.☆78Mar 22, 2022Updated 4 years ago
- Hydra Password Cracking Cheetsheet☆426Oct 7, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- ☆224Mar 10, 2024Updated 2 years ago
- Course repository for PowerShell for Pentesters Course☆441Mar 9, 2022Updated 4 years ago
- Some notes about Hydra for bruteforcing☆190Mar 11, 2020Updated 6 years ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆258May 25, 2023Updated 2 years ago
- Generate Discord Token Grabbers for both Windows and MacOS☆152Jun 2, 2022Updated 3 years ago
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆201Jun 17, 2022Updated 3 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆255Dec 4, 2022Updated 3 years ago
- Terminate AV/EDR Processes using kernel driver☆354Jun 12, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆365Dec 19, 2022Updated 3 years ago
- Golang library for malware development☆391Nov 20, 2024Updated last year
- Windows Local Privilege Escalation from Service Account to System☆943Feb 23, 2020Updated 6 years ago
- This repo contains : simple shellcode Loader , Encoders (base64 - custom - UUID - IPv4 - MAC), Encryptors (AES), Fileless Loader (Winhttp…☆445Aug 2, 2023Updated 2 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆602Jan 20, 2026Updated 4 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆451Jan 5, 2025Updated last year
- Redeye is a tool intended to help you manage your data during a pentest operation☆470Aug 21, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆530Dec 17, 2025Updated 5 months ago
- ☆524Dec 19, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collection of UAC Bypass Techniques Weaponized as BOFs☆627Feb 21, 2024Updated 2 years ago
- Don't let buffer overflows overflow your mind☆457Jun 3, 2020Updated 5 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆686Nov 9, 2023Updated 2 years ago
- Hekatomb is a python script that connects to LDAP directory to retrieve all computers and users informations. Then it will download all D…☆526Jul 31, 2024Updated last year
- Red Team Toolkit is an Open-Source Django Offensive Web-App which is keeping the useful offensive tools used in the red-teaming together.☆568Feb 13, 2026Updated 3 months ago
- UAC bypass for x64 Windows 7 - 11☆843Feb 2, 2026Updated 3 months ago
- Sandman is a NTP based backdoor for hardened networks.☆818Mar 31, 2024Updated 2 years ago