confirmedcode / MainLinks
☆10Updated last week
Alternatives and similar repositories for Main
Users that are interested in Main are comparing it to the libraries listed below
Sorting:
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Updated 6 years ago
- Repo to store Windows PE's and Utilities for easy access.☆16Updated 4 years ago
- Reverse shell and rootkit☆19Updated 8 years ago
- BitBender is a byte manipulation tool☆12Updated 7 years ago
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Private Internet Access - Windows TAP adapter for Desktop VPN Client☆12Updated 5 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Confirmed VPN client for Android☆15Updated 4 years ago
- Collection of cracked malware☆14Updated 6 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- tamper resistant audit log☆18Updated 6 years ago
- This is the ToRat server, a part of the ToRat Project.☆23Updated 5 years ago
- This is a collection of #botnet source codes, unorganized. For EDUCATIONAL PURPOSES ONLY☆23Updated 6 years ago
- A botnet (C&C) framework that create in bash and using crontab for periodic execute☆11Updated 7 years ago
- File antivirus☆10Updated 6 years ago
- Minimalistic DNS logging tool☆44Updated 3 years ago
- A fast Web API scraper written in C++ and built on Boost ASIO☆45Updated 5 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Penetration tests on SSH servers using brute force or dictionary attacks. Written in Python.☆32Updated 5 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Updated 4 years ago
- Run Any Native PE file as a memory ONLY Payload , most likely as a shellcode using hta attack vector which interacts with Powershell.☆27Updated 8 years ago
- Build scripts for tor binary☆22Updated 4 months ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆29Updated 6 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- proxyd proxies data between TCP, TLS, and unix sockets☆21Updated 8 years ago