audibleblink / amnesia
Takes unallocated memory and fills it with junk to mess with forensics tools.
☆13Updated 10 months ago
Related projects ⓘ
Alternatives and complementary repositories for amnesia
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- Automatically spin up infra for phishing☆64Updated 4 years ago
- A logging ASKPASS binary☆28Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆16Updated 5 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆57Updated 6 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 4 years ago
- Stealing MFA/2FA tokens and using them to logon with VPN clients☆17Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- The best way to send emails in Go.☆10Updated 3 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- Network Finger Printer☆16Updated 7 years ago
- Periodically check hashcat cracking progress and notify of success.☆11Updated 5 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆43Updated 3 years ago
- ☆23Updated 4 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- PAM Backdoor☆27Updated last year
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Shellcode process injector☆27Updated 4 years ago
- A cross platform tool for verifying credentials and executing single commands☆32Updated 5 years ago
- Sp00fer blog post -☆25Updated 2 years ago
- ☆16Updated 4 years ago
- Methods of C2☆21Updated 9 years ago
- automatic scan for hackthebox☆14Updated 4 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- wordlists for password cracking☆25Updated 2 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 2 years ago