brosck / Zoris
γπͺγThe hidden hookless backdoor
β12Updated last month
Alternatives and similar repositories for Zoris:
Users that are interested in Zoris are comparing it to the libraries listed below
- γπγTool created to extract metadata from a domainβ13Updated last month
- β10Updated 2 months ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.β20Updated 3 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.β21Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.β20Updated 3 years ago
- β13Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online maβ¦β13Updated 4 years ago
- β24Updated last year
- Malware Libraries focused in help Malware Developmentβ15Updated last year
- Machine Learning basics with phishing datasetβ10Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.β25Updated last year
- Recon-ng modules for basic OSINT.β11Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFsβ12Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.β17Updated last year
- Hack Windows with FUD backdoor/payload, Escalates LINUX privileges, Devastate Linux, Tunnel forwardingβ12Updated 4 years ago
- Multithreaded spraying of a password on all accounts of a domain.β18Updated last month
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.β14Updated 5 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engagemeβ¦β19Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) courseβ20Updated 6 years ago
- Beacon Object Files used for Cobalt Strikeβ17Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ16Updated 2 years ago
- Automate Blind SQL Injection with Python.β20Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)β21Updated 3 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerSβ¦β13Updated 2 years ago
- β16Updated 2 years ago
- β14Updated last year
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps β¦β24Updated 2 years ago
- γπ₯γCVE-2022-33891 - Apache Spark Command Injectionβ27Updated 2 years ago