audibleblink / amnesiaLinks
Takes unallocated memory and fills it with junk to mess with forensics tools.
☆13Updated 2 years ago
Alternatives and similar repositories for amnesia
Users that are interested in amnesia are comparing it to the libraries listed below
Sorting:
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- A cross platform tool for verifying credentials and executing single commands☆33Updated 6 years ago
- wordlists for password cracking☆28Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 6 years ago
- Experimenting with destructive file attacks in Go☆19Updated 6 years ago
- DNS server for pentesters☆50Updated 2 months ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26Updated 3 years ago
- Generic malicious browser check written in C#☆13Updated 9 years ago
- Network Finger Printer☆16Updated 8 years ago
- Sp00fer blog post -☆24Updated 3 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Obfuscates a Python Script and the accompanying Shellcode.☆57Updated 6 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Exploits developped by Outflank B.V. team members☆21Updated 8 years ago
- Collaborative web dashboard for RedTeam pentesters☆21Updated 6 years ago
- Automatically spin up infra for phishing☆65Updated 5 years ago
- A logging ASKPASS binary☆29Updated 5 years ago
- Python port of Pipal for password analytics☆22Updated 2 years ago
- ☆17Updated 5 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers f…☆19Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- Post-exploitation tool☆26Updated 4 years ago
- Random code snippets☆11Updated 2 years ago
- Methods of C2☆21Updated 10 years ago
- ☆24Updated 5 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Updated 8 years ago
- rustyIron is a tool that takes advantage of functionality within Ivanti's MobileIron MDM solution to perform single-factor authentication…☆44Updated 4 years ago
- various slides and presentations I've worked on☆19Updated 9 months ago