Exfiltrate data from a compromised target using covert channels
☆17Mar 20, 2021Updated 5 years ago
Alternatives and similar repositories for syn-file
Users that are interested in syn-file are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit for Microsoft SharePoint 2019☆13Dec 28, 2023Updated 2 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆33Jun 26, 2020Updated 5 years ago
- A collaborative, multi-platform, red teaming framework☆13Jan 19, 2020Updated 6 years ago
- ☆11Aug 7, 2021Updated 4 years ago
- 0-ring rootkit revealer for Linux☆29Sep 5, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ProcessHollowing via csharp☆13Dec 21, 2021Updated 4 years ago
- Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.☆20Jan 3, 2017Updated 9 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 3 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆11Aug 6, 2018Updated 7 years ago
- Reverse SSH C2☆34Sep 19, 2025Updated 8 months ago
- OffensiveCon 2024 Repo, contains PoCs and materials for talk "UEFI and the Task of the Translator"☆41May 22, 2024Updated last year
- ☆18Aug 19, 2021Updated 4 years ago
- IUSB - Virtual Media Protocol☆15Aug 8, 2015Updated 10 years ago
- public index of IDA Pro plugins☆34Updated this week
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Windows Exploit List☆17Jun 13, 2019Updated 6 years ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆184Feb 2, 2026Updated 3 months ago
- List of android RATs☆15Jan 2, 2021Updated 5 years ago
- Browse Windows Prefetch versions: 17,23,26,30v1/2,31 & some of SuperFetch .7db/.db's☆65Dec 18, 2024Updated last year
- Guest to host VM escape exploit for Parallels Desktop☆28Nov 14, 2014Updated 11 years ago
- A different approach to writing BOFs in rust.☆21Aug 20, 2025Updated 8 months ago
- 域前置版本FRP☆17Nov 24, 2022Updated 3 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Process hunting Toolkit is toolkit capable of hunting down malicious processes on Windows☆14Jan 31, 2025Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- POC - x64 injector -> x86 injectee dll injector☆15Apr 4, 2024Updated 2 years ago
- rust actix-web admin☆11Apr 22, 2022Updated 4 years ago
- Thunderclap QEMU-based network card emulation☆30Oct 3, 2022Updated 3 years ago
- Mirror of PowerBroker Identity Services☆20Dec 28, 2016Updated 9 years ago
- Download pdbs from symbol servers and cache locally, parse symbol paths from env vars☆21Mar 7, 2025Updated last year
- C# Tool to interact with MS Exchange based on MS docs☆102Dec 7, 2022Updated 3 years ago
- ☆25Apr 28, 2024Updated 2 years ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆28Aug 17, 2021Updated 4 years ago
- Small handy tool for crafting shellcodes by hand.☆18Apr 20, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆51Jun 16, 2025Updated 11 months ago
- Process inject technique "Thread hijacking" via csharp☆15Dec 18, 2021Updated 4 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆95Jul 3, 2021Updated 4 years ago
- Crypto Ransomware made with: - Go for encryption and decryption - PHP/MySQL for saving and retrieving keys.☆29Nov 28, 2017Updated 8 years ago
- ☆31Aug 23, 2020Updated 5 years ago
- IDA pro plugin for assign type declarations with 'bad' characters. Like c++ stl templates Less/Greater brackets.☆14Jan 27, 2022Updated 4 years ago
- A (quite) simple steganography algorithm to hide shellcodes within bitmap image.☆25May 4, 2024Updated 2 years ago