bonedaddy / escortLinks
ssshh its a secret ;)
☆22Updated 3 years ago
Alternatives and similar repositories for escort
Users that are interested in escort are comparing it to the libraries listed below
Sorting:
- Public exploits☆15Updated 7 years ago
- MSFVenom Powershell Stager Encoder & Generator☆16Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- A cross-platform Nim implant for Prelude Operator☆32Updated 3 years ago
- GhostSec Scam Detection Tool☆15Updated 4 years ago
- Some useful scripts for CobaltStrike☆11Updated 6 years ago
- Modular C2 server to tame your pack of wolves☆19Updated last week
- A PowerShell script that simplifies life and therefore... phishing.☆19Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆20Updated 3 years ago
- Prometheus Service Discovery for Tailscale (Python Edition)☆26Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Search and extract blob files on the Ethereum Blockchain network☆45Updated 4 years ago
- recover Firefox and more browsers logins☆50Updated 3 years ago
- Decrypts and dumps Chrome-based browser cookies and passwords in Microsoft Windows.☆20Updated last year
- Python script that generates Visual Basic Script (VBS) stagers for executing PowerShell scripts directly from specified URLs. It provides…☆13Updated last year
- Another vulnerability scanner☆19Updated 3 weeks ago
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- Linux Enumeration / Privilege escalation tool☆24Updated 5 years ago
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Red Team C2 and Post Exploitation code☆37Updated last month
- ☆25Updated 3 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated 3 weeks ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 3 years ago
- 🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD)☆48Updated last year
- A local LKM rootkit loader/dropper that lists available security mechanisms☆52Updated 4 years ago
- A collection of awesome readme templates to display on your profile☆18Updated 5 years ago
- Bind/Reverse Shells, SOCKS, etc over Tor in Golang☆62Updated 4 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆69Updated 5 years ago
- Remote Desktop Protocol .NET Console Application for Authenticated Command Execution☆12Updated 5 years ago