d1mov / evillnkView external linksLinks
Python GUI based tool to generate lnk files with a payload and decoy files embedded inside.
☆33Aug 22, 2025Updated 5 months ago
Alternatives and similar repositories for evillnk
Users that are interested in evillnk are comparing it to the libraries listed below
Sorting:
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated last year
- Rex Shellcode Loader for AV/EDR evasion☆35Apr 7, 2024Updated last year
- Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover☆85Oct 20, 2025Updated 3 months ago
- ❤微信小程序云开发——🌟山农速达🌟代取快递平台,该项目是一款代取快递的平台,用户可以通过搜索或扫描二维码进入。 小程序包括前后台,用户可以下单,由后台人员即配送人员接受到下单信息,然后接单配送。☆10Mar 17, 2022Updated 3 years ago
- A collection of powershell scripts that are designed to be ran from a Microsoft Defender for Endpoint Live Response terminal, utilizing o…☆12Apr 26, 2023Updated 2 years ago
- This simple SMB vulnerability MS17-010 scanner is developed to help security professionals to quickly check if a computer is vulnerable t…☆10Jul 24, 2017Updated 8 years ago
- Cobalt Strike module x loader x profile x wike / A public collection of open resources for Cobalt Strike (only legal use in Red Team and …☆107Dec 7, 2025Updated 2 months ago
- 一些平时自己整理的fuzz字典和爆破字典☆15Mar 24, 2020Updated 5 years ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆24Jan 30, 2026Updated 2 weeks ago
- Socks5man is a Socks5 management tool and Python library☆12Mar 10, 2023Updated 2 years ago
- 一个红队知识仓库☆11Aug 1, 2023Updated 2 years ago
- ☆11Apr 23, 2025Updated 9 months ago
- 🛠️ In this repository you will find all the OSCP tools I created and used during the course. 🛠️☆12Dec 23, 2023Updated 2 years ago
- ☆20Jan 15, 2025Updated last year
- Extract and execute a PE embedded within a PNG file using an LNK file.☆466Nov 2, 2024Updated last year
- Windows - Privilege Escalation Checklist☆20Aug 28, 2020Updated 5 years ago
- This is mirror of source codes, executables and explanatory texts taken from the original ConsoleSoft by Carlos Montiers https://web.arch…☆11May 17, 2022Updated 3 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- Python 101 - Mau tau gimana cara belajar python? Disini dimulainya☆11Oct 24, 2018Updated 7 years ago
- arm64 linux position-independent shellcode framework☆29Dec 12, 2025Updated 2 months ago
- Fast Proxy Checker☆18Dec 4, 2024Updated last year
- 🤖 几个数据质量较高的社工库机器人☆21Updated this week
- 对指定目录下进行敏感信息检索☆15Feb 14, 2025Updated last year
- A C++17 header-only library that provides compile-time string encryption and decryption using SIMD instructions and junk code injection.☆24Jan 20, 2026Updated 3 weeks ago
- Generated random UserAgent for any browser and os and scrap new proxy ip (auto update)☆13Nov 23, 2024Updated last year
- 如何没有电话号码注册telegram账号☆20Jan 15, 2025Updated last year
- The official code for our paper StackFLOW: Monocular Human-Object Reconstruction by Stacked Normalizing Flow with Offset in IJCAI 2023.☆13Jul 17, 2024Updated last year
- CVE漏洞挖掘 (CVE Vulnerability Hunting), by Tr0e.☆18Jun 21, 2025Updated 7 months ago
- A simple index for HackTheBox machine along with tags☆16Jan 8, 2026Updated last month
- 斐讯K2+多拨+SSR☆10Jun 20, 2019Updated 6 years ago
- Collection of malware analysis, binary exploitation and reverse engineering related resources☆23Dec 23, 2025Updated last month
- System for wireless optogenetic stimulation☆13Jun 14, 2022Updated 3 years ago
- rootkit-Ninja is simple linux rootkit to keep gained root access with several tricks☆15Sep 8, 2018Updated 7 years ago
- Deep learning-based framework for fast and accurate acoustic hologram generation☆14Sep 30, 2024Updated last year
- SpringBlade框架JWT认证的漏洞检测工具☆11Apr 22, 2025Updated 9 months ago
- Kernel-space x86_64 Linux rootkit leveraging kprobes and ftrace for syscall hooking (hiding entries and reverse shell backdoor)☆20Nov 20, 2025Updated 2 months ago
- Cyber stalker is a web application based tool to catch fake account users online☆18May 6, 2023Updated 2 years ago
- PC免杀远控winos4.0成品☆32Mar 26, 2025Updated 10 months ago
- ☆15Feb 6, 2023Updated 3 years ago