Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".
☆11Nov 29, 2021Updated 4 years ago
Alternatives and similar repositories for Maltensions
Users that are interested in Maltensions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A way to maintain long-term access to Windows LAPS for lateral movement in AD via installing an Offensive LAPS RPC backdoor on a DC.☆29Jun 9, 2025Updated 9 months ago
- ☆14Nov 15, 2025Updated 4 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆37May 9, 2015Updated 10 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Undocumented way of fetching list of processes by bruteforcing NtQuerySystemInformation☆16Nov 20, 2017Updated 8 years ago
- ☆15Aug 6, 2021Updated 4 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Like Hell's Gate but more EGG :)☆20Mar 11, 2022Updated 4 years ago
- 一款支持微信和QQ、UC手机浏览器的分享工具,可以自定义标题、链接、icon等☆12Apr 19, 2018Updated 7 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- ☆10Oct 11, 2020Updated 5 years ago
- AIDA64DRIVER Elevation of Privilege Vulnerability☆16Oct 25, 2024Updated last year
- Glossary of security terms☆12Feb 26, 2026Updated 3 weeks ago
- agent.btz download MALWARE BINARY PROVIDED + POC video☆21Jul 11, 2021Updated 4 years ago
- masscan cgo demo☆20Jul 23, 2021Updated 4 years ago
- Hyundai CANBus audio control☆15Jun 7, 2021Updated 4 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Mar 31, 2021Updated 4 years ago
- MITRE ATT&CK visualizations☆12Jan 28, 2022Updated 4 years ago
- This extension provides a central location for viewing all GraphQL requests/responses within a Burp project. It provides a clean UI that …☆15Feb 24, 2022Updated 4 years ago
- [talk] GoDays 2019: Going secure with Go☆26Feb 1, 2019Updated 7 years ago
- Vendont is a Venmo transaction finder/scraper. It uses Venmo's own public API system to fetch all transactions at a given time.☆10Jun 16, 2019Updated 6 years ago
- Golang evasion tool, execute-assembly .Net file☆98Apr 25, 2022Updated 3 years ago
- Slurm Examples☆10Aug 30, 2024Updated last year
- A webpacker extension to support Service Workers☆14Mar 8, 2023Updated 3 years ago
- foundation-datetimepicker-rails☆22Sep 7, 2022Updated 3 years ago
- ☆13Feb 5, 2022Updated 4 years ago
- This program will connect multiple masters (SCADA master stations) to single slave (RTU) as defined protocol IEC 60870-5-104. Although th…☆15Dec 19, 2021Updated 4 years ago
- Dll injection for executable file☆17Jul 22, 2016Updated 9 years ago
- ☆20Jan 24, 2022Updated 4 years ago
- Files related to video tutorials from my YouTube channel!☆12Mar 12, 2019Updated 7 years ago
- Injector with kernel power☆18Jan 2, 2021Updated 5 years ago
- Web Player for Flipper Music Format files☆14Jan 7, 2025Updated last year
- IDAPython project for Hex-Ray's IDA Pro☆12Jul 2, 2015Updated 10 years ago
- This driver hooks a device object for ioctl and uses mdls to allocate physical pages and manually injects an entry into a process's page …☆15Feb 14, 2023Updated 3 years ago
- JWT extension for the Sorcery authentication gem☆19Jul 4, 2024Updated last year
- Reports in .MD format☆21Jul 8, 2025Updated 8 months ago