coolboy4me / OpenArk
OpenArk is a open source anti-rookit(Ark) tool on Windows.
☆18Updated 5 years ago
Related projects: ⓘ
- ☆21Updated 4 years ago
- Veil 3.1.X (Check version info in Veil at runtime)☆14Updated 5 years ago
- ☆39Updated this week
- ☆21Updated this week
- A tiny keylogger coded with just 12 lines of Python script, which hooks to the kernel, intercepts keystrokes and forwards them to your we…☆34Updated 3 months ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25Updated 5 years ago
- ☆13Updated 6 years ago
- ☆24Updated 4 years ago
- A Python based web application scanner to gather OSINT and fuzz for OWASP vulnerabilities on a target website.☆30Updated 5 years ago
- Modern Phishing Tool With Advanced Functionality [ Android-Support-Available ]☆28Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆15Updated 5 years ago
- urlRecon - Info Gathering or Recon tool for Urls -> Retrieves * Whois information of the domain * DNS Details of the domain * Serve…☆34Updated 2 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆18Updated 5 years ago
- Automated Penetration Testing Framework☆35Updated 5 years ago
- A tool to abuse Exchange services☆18Updated 5 years ago
- A Tool for Domain Flyovers☆18Updated 4 years ago
- ☆36Updated 2 years ago
- ☆20Updated this week
- Collection of tips, tools and tutorials around infosec☆32Updated 7 years ago
- This PowerShell script will automate the setup of a development environment, consisting of all the necessary software tools required to c…☆16Updated 5 years ago
- My Dirty Scriptss ..!!!!! Pentest , OSINT , Python ,, Trainings☆52Updated 6 years ago
- ☆17Updated 5 years ago
- ☆22Updated this week
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.☆13Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆18Updated 6 years ago
- PowerShell Pass The Hash Utils☆16Updated 5 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆27Updated 5 years ago