Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".
☆11Nov 29, 2021Updated 4 years ago
Alternatives and similar repositories for Maltensions
Users that are interested in Maltensions are comparing it to the libraries listed below
Sorting:
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- A map of the botnet attacking our server☆14Aug 24, 2017Updated 8 years ago
- ☆32Feb 3, 2026Updated last month
- Check your email(s) using popular online services to see if it appears in any data-breach☆30Jan 11, 2026Updated last month
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated 2 years ago
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- PowerShell alternative/restriction bypass☆11Apr 6, 2025Updated 10 months ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Scanning in the middlelayer, v2☆10Feb 18, 2026Updated 2 weeks ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Chrome Extensions Dataset☆10Updated this week
- Glossary of security terms☆12Updated this week
- ☆12Oct 9, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Scans a given directory tree for interesting assembly references☆17Feb 24, 2026Updated last week
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- an experimental implementation of Burrow's delta in Python 3☆12Jun 6, 2017Updated 8 years ago
- Enhanced-PsExec the GUI edition☆13Sep 8, 2021Updated 4 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- C# client for SonarQube 8.x☆11Apr 6, 2023Updated 2 years ago
- Update an ECS service to use a new Docker image☆13Feb 21, 2026Updated last week
- Slurm Examples☆10Aug 30, 2024Updated last year
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆17Jul 23, 2025Updated 7 months ago
- 📥 A JavaScript library for improving HTML file inputs☆10Dec 11, 2025Updated 2 months ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago