Command and Control that uses NTP as the transport protocol.
☆25Jan 29, 2022Updated 4 years ago
Alternatives and similar repositories for mesa
Users that are interested in mesa are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- Raw socket library/framework for red team events☆33Feb 25, 2023Updated 3 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Linux Kernel Module Rootkit with module hiding, RCE/reverse shell, and persistence capabilities☆15Feb 23, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A security competition scoring system built on the Elastic stack.☆41Dec 11, 2025Updated 5 months ago
- Winlogon and LSA Notification Password Filters☆19Jul 11, 2023Updated 2 years ago
- NGINX module to allow for RCE through a specific header☆27Oct 17, 2022Updated 3 years ago
- A collection of resources that I've used to learn things☆14Aug 31, 2021Updated 4 years ago
- A "custom" layer 4 protocol for raw socket communication on linux. Golang library.☆10Dec 20, 2018Updated 7 years ago
- A collection of FreeBSD rootkit kernel modules and utilities☆13Jun 25, 2025Updated 10 months ago
- Windows NTLM Authentication Backdoor☆18Jan 27, 2022Updated 4 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This is my own programming language called fluffy(similar to python)☆13Apr 12, 2020Updated 6 years ago
- Bad bad bad bad bad stuff☆12Jun 10, 2019Updated 6 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Basic Linux binary shim method on the passwd binary from the shadow package to steal credentials as they are changed.☆14Nov 14, 2024Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Custom SOCKS proxy for redteam☆14Mar 29, 2022Updated 4 years ago
- Deep Packet Inspection • Traffic Forensics • Network Threat Detection☆52Feb 20, 2026Updated 3 months ago
- Rat Inject is C++ Executable to gain Undetectable Persistence in Windows via 4 Registry Keys☆31Nov 29, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Sublime Text plugin that allows for Nmap syntax highlighting☆13Sep 14, 2024Updated last year
- Evasive ELF Static PIE User-Land-Exec featured in Tmpout Vol 1.☆29Sep 11, 2021Updated 4 years ago
- This is a quick script installation for resilient redirector using nginx reverse proxy and letsencrypt compatible with some popular Post-…☆87Jul 2, 2019Updated 6 years ago
- drvtriks kernel driver for Windows 7 SP1 and 8.1 x64, that tricks around in your system.☆34Oct 6, 2017Updated 8 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- AdminX it's a Malware to execute process as some users from a Windows OS☆10May 4, 2023Updated 3 years ago
- BOF to impersonate TrustedInstaller via DISM API trigger and thread impersonation☆129Mar 27, 2026Updated last month
- An utility tool to run application release-checklist safely☆14Apr 26, 2020Updated 6 years ago
- CSharp4Pentesters☆11Mar 5, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Heartbleed OpenSSL exploit☆14Apr 11, 2014Updated 12 years ago
- This is a tutorial and introduction to Reflective DLL Injection + reading outputs of injected dll using named pipes.☆20Feb 8, 2025Updated last year
- This project enables malware to resurrect and remain hidden even after termination, using a User-Mode Program and Kernel-Mode Driver as p…☆10Jan 7, 2025Updated last year
- Golang tool designed to exfiltrate passwords found via the sshd and su services☆28Nov 23, 2025Updated 5 months ago
- Run Managed Assemblies with RunDll☆17Jul 2, 2018Updated 7 years ago
- quick 'n dirty poc based on PoC windows auth prompt in c# based on https://gist.githubusercontent.com/mayuki/339952/raw/2c36b735bc51861a3…☆31Jun 12, 2020Updated 5 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago