Code from my Youtube channel "Asim Code".
☆13Feb 4, 2025Updated last year
Alternatives and similar repositories for Asim-Code-Youtube-Channel-Code
Users that are interested in Asim-Code-Youtube-Channel-Code are comparing it to the libraries listed below
Sorting:
- Chrome Credential Stealer that reports to Discord through Webhooks☆39Mar 11, 2022Updated 3 years ago
- Create a fully undetectable backdoor with simple steps.☆77Mar 22, 2022Updated 3 years ago
- Generate Discord Token Grabbers for both Windows and MacOS☆150Jun 2, 2022Updated 3 years ago
- ☆203Feb 13, 2023Updated 3 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆240Dec 4, 2022Updated 3 years ago
- Terminate AV/EDR Processes using kernel driver☆352Jun 12, 2023Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆568Jan 20, 2026Updated last month
- Redeye is a tool intended to help you manage your data during a pentest operation☆472Aug 21, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆519Dec 17, 2025Updated 2 months ago
- Collection of UAC Bypass Techniques Weaponized as BOFs☆607Feb 21, 2024Updated 2 years ago
- Code files by Packt☆538Jan 14, 2021Updated 5 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Oct 29, 2022Updated 3 years ago
- UAC bypass for x64 Windows 7 - 11☆831Feb 2, 2026Updated 3 weeks ago
- Windows Local Privilege Escalation from Service Account to System☆913Feb 23, 2020Updated 6 years ago
- Multi-Packer wrapper letting us daisy-chain various packers, obfuscators and other Red Team oriented weaponry. Featured with artifacts wa…☆1,051Oct 14, 2025Updated 4 months ago
- Now You See Me, Now You Don't☆1,024Jan 23, 2026Updated last month
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,097Jun 10, 2024Updated last year
- ☆1,179Jun 23, 2024Updated last year
- Red Team Cheatsheet in constant expansion.☆1,263Dec 28, 2023Updated 2 years ago
- Living Off The Land Drivers☆1,418Feb 12, 2026Updated 2 weeks ago
- Generates millions of keyword-based password mutations in seconds.☆1,411Jun 8, 2025Updated 8 months ago
- Cryptocurrency App powered by RapidAPI☆1,358Oct 29, 2024Updated last year
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,475Jan 23, 2026Updated last month
- 100+ mini web projects using HTML, CSS and JavaScript.☆2,098Oct 19, 2025Updated 4 months ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,782Jan 6, 2023Updated 3 years ago
- Powershell module that can be used by Blue Teams, Incident Responders and System Administrators to hunt persistences implanted in Windows…☆2,055Dec 11, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,155Feb 21, 2026Updated last week
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,251Apr 12, 2024Updated last year
- 剖析 STL 是一种享受的过程!☆2,523Jan 15, 2018Updated 8 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,161Mar 28, 2025Updated 11 months ago
- Fancy reverse and bind shell handler☆2,868Aug 9, 2024Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆3,138Oct 19, 2025Updated 4 months ago
- Tutorial created by Enyel Sequeira, taught by JavaScript Mastery☆3,496Jul 18, 2024Updated last year
- Simple (relatively) things allowing you to dig a bit deeper than usual.☆3,483Feb 16, 2026Updated last week
- Potentially dangerous files☆3,274Aug 25, 2025Updated 6 months ago
- CTF framework and exploit development library☆13,278Updated this week
- Tools and Techniques for Blue Team / Incident Response☆3,942Mar 27, 2025Updated 11 months ago
- A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.☆3,421Jan 19, 2025Updated last year