Code from my Youtube channel "Asim Code".
☆13Feb 4, 2025Updated last year
Alternatives and similar repositories for Asim-Code-Youtube-Channel-Code
Users that are interested in Asim-Code-Youtube-Channel-Code are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- So recently, I started off with some basic exploit development, Here is a collection of all the stack overflow exploits I programmed for …☆11Sep 8, 2021Updated 4 years ago
- Notes about the YouTube playlist: Red Team Operations with Cobalt Strike (2019)☆19Feb 16, 2021Updated 5 years ago
- The easy way to create a working directory with standard report template files for common security scenarios: penetration testing, CTF, t…☆16Jan 5, 2024Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆25Jan 11, 2023Updated 3 years ago
- Chegg bot for Discord. You can access Chegg answers via discord.☆19Jun 24, 2022Updated 3 years ago
- All binaries, tools,wordlists and tutorials you need to pass eCPPTv2 - For Free!☆26Jan 28, 2023Updated 3 years ago
- ☆36Feb 14, 2023Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆37Jul 9, 2020Updated 5 years ago
- A simple script to automate systemd backdoor☆39Dec 19, 2022Updated 3 years ago
- Chrome Credential Stealer that reports to Discord through Webhooks☆39Mar 11, 2022Updated 4 years ago
- ☆56Jan 5, 2023Updated 3 years ago
- ☆67Apr 5, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Create a fully undetectable backdoor with simple steps.☆77Mar 22, 2022Updated 4 years ago
- ☆120Jan 30, 2024Updated 2 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆164Apr 22, 2025Updated 11 months ago
- This POC gives you the possibility to compile a .exe to completely avoid statically detection by AV/EPP/EDR of your C2-shellcode and down…☆257May 25, 2023Updated 2 years ago
- Generate Discord Token Grabbers for both Windows and MacOS☆152Jun 2, 2022Updated 3 years ago
- Lab solutions and commands from studying for the eLearnSecurity Junior Penetration Tester certificate.☆203Jun 17, 2022Updated 3 years ago
- Cheatsheet for the commands learned in Attack and Defense Active Directory Lab☆242Dec 4, 2022Updated 3 years ago
- Terminate AV/EDR Processes using kernel driver☆353Jun 12, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆295Jan 1, 2022Updated 4 years ago
- Full-Stack React Projects, published by Packt☆283Mar 1, 2023Updated 3 years ago
- Windows Local Privilege Escalation from Service Account to System☆929Feb 23, 2020Updated 6 years ago
- Simple CLI tool for the generation of bind and reverse shells in multiple languages☆391Feb 27, 2026Updated last month
- PrivKit is a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS.☆587Jan 20, 2026Updated 2 months ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,420Feb 24, 2023Updated 3 years ago
- Redeye is a tool intended to help you manage your data during a pentest operation☆472Aug 21, 2024Updated last year
- Analyse your malware to surgically obfuscate it☆527Dec 17, 2025Updated 3 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Collection of UAC Bypass Techniques Weaponized as BOFs☆617Feb 21, 2024Updated 2 years ago
- Don't let buffer overflows overflow your mind☆453Jun 3, 2020Updated 5 years ago
- Black Angel is a Windows 11/10 x64 kernel mode rootkit. Rootkit can be loaded with enabled DSE while maintaining its full functionality.☆682Nov 9, 2023Updated 2 years ago
- A simple python packer to easily bypass Windows Defender☆645Apr 3, 2022Updated 4 years ago
- UAC bypass for x64 Windows 7 - 11☆836Feb 2, 2026Updated 2 months ago
- Sandman is a NTP based backdoor for hardened networks.☆817Mar 31, 2024Updated 2 years ago
- A Cloud Forensics Powershell module to run threat hunting playbooks on data from Azure and O365☆789Oct 29, 2022Updated 3 years ago