Script to test NetSec capabilities.
☆21May 1, 2023Updated 2 years ago
Alternatives and similar repositories for Somnium
Users that are interested in Somnium are comparing it to the libraries listed below
Sorting:
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Mar 28, 2022Updated 3 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- A collection of handy and specific tools for the Red Teamer☆11Aug 13, 2024Updated last year
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Perform arp spoofing attack in C☆14Aug 18, 2023Updated 2 years ago
- Gophish with Malicious Attachment and HTTP redirect support☆13Dec 11, 2023Updated 2 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Sep 18, 2017Updated 8 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Jul 7, 2022Updated 3 years ago
- OSCP Study Guide☆41Oct 10, 2022Updated 3 years ago
- the Open Source and Pure C++ Packer for eXecutables☆21Mar 25, 2023Updated 2 years ago
- Probe: This is a special tool for bug hunter for automated recon process smoothly.☆24Jan 29, 2024Updated 2 years ago
- ☆25Nov 28, 2022Updated 3 years ago
- Mara is a userland pty/tty sniffer☆53Dec 22, 2023Updated 2 years ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Jun 5, 2025Updated 9 months ago
- Code Hierarchy Exploration Net (chen)☆27Feb 14, 2026Updated 3 weeks ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 3 years ago
- ELF Sectional docking payload injector system☆21Jun 28, 2022Updated 3 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- Moved to HappyHackingSpace/metamaska☆23Feb 11, 2026Updated 3 weeks ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- CQ, a code security scanner☆99Feb 23, 2026Updated last week
- web application pentesting tools for docker☆17Aug 9, 2022Updated 3 years ago
- ☆11Feb 14, 2023Updated 3 years ago
- ☆29May 16, 2023Updated 2 years ago
- A proof-of-concept Linux clone of Santa, Google's binary authorization system for macOS☆34Nov 24, 2022Updated 3 years ago
- Configuration security analyzer for network devices. Pynipper-ng is an evolution of nipper-ng, updated and translated to python. [ALPHA v…☆30Jan 15, 2026Updated last month
- ☆26Apr 23, 2024Updated last year
- ☆36Apr 24, 2024Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- A lightweight C++ library designed for function interception within injected DLLs, providing a streamlined approach to modifying applicat…☆41Oct 19, 2023Updated 2 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- AntiRansomware Linux Kernel Module☆37May 25, 2023Updated 2 years ago
- ☆80Apr 18, 2023Updated 2 years ago