☆42Apr 20, 2018Updated 8 years ago
Alternatives and similar repositories for hidemyps
Users that are interested in hidemyps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Custom THP Dropper☆26Mar 27, 2018Updated 8 years ago
- Basic c-keylogger☆26Mar 11, 2018Updated 8 years ago
- ☆29Apr 20, 2018Updated 8 years ago
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆446Nov 30, 2023Updated 2 years ago
- A web scraper for generating password files based on plain text found☆130Jul 19, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- SSLScrape | A scanning tool for scaping hostnames from SSL certificates.☆338Apr 29, 2021Updated 5 years ago
- Fileless web browser information extraction☆221Apr 23, 2018Updated 8 years ago
- ☆14Jun 26, 2020Updated 5 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Preventing malicious takeover of the retired slurp AWS tool☆41Aug 27, 2018Updated 7 years ago
- PowerShell Module Bindings for Capstone/Keystone☆25Nov 15, 2016Updated 9 years ago
- The project is called Great SCT (Great Scott). Great SCT is an open source project to generate application white list bypasses. This tool…☆1,124Feb 10, 2021Updated 5 years ago
- getsystem via parent process using ps1 & embeded c#☆481Oct 26, 2023Updated 2 years ago
- Extract the password of the current user from flow (keylogger, config file, ..) Use SSPI to get a valid NTLM challenge/response and test …☆59Mar 8, 2019Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- ☆128Jun 19, 2020Updated 5 years ago
- InsecurePowerShell is PowerShell with some security features removed.☆105Dec 19, 2017Updated 8 years ago
- PowerShell Remote Download Cradle Generator & Obfuscator☆851Mar 23, 2018Updated 8 years ago
- ☆37Aug 18, 2019Updated 6 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated last year
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- Smb Scanner from PingCastle☆125Apr 9, 2019Updated 7 years ago
- VBA Obfuscation Tools combined with an MS office document generator☆554Oct 15, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Payload Generation Framework☆1,977Aug 21, 2024Updated last year
- SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, Supe…☆1,321Nov 22, 2022Updated 3 years ago
- ☆14May 23, 2018Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Loading and executing shellcode in C# without PInvoke.☆22Jan 10, 2022Updated 4 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Assorted scripts and one off things☆271Aug 20, 2024Updated last year
- ☆526Aug 11, 2023Updated 2 years ago
- Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS☆1,656Oct 11, 2018Updated 7 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Jan 4, 2024Updated 2 years ago
- Burp extension that add a tab to edit Office Open XML document (xlsx,docx,pptx)☆13Jan 5, 2018Updated 8 years ago
- Embed and hide any file in an HTML file☆491Sep 27, 2017Updated 8 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago