demon-i386 / pop_n_bubbleLinks
Bubble.io security research: 0day / exploiting elasticsearch implementation / Research by: Lucca & Pedro
☆74Updated 2 months ago
Alternatives and similar repositories for pop_n_bubble
Users that are interested in pop_n_bubble are comparing it to the libraries listed below
Sorting:
- Tool designed to exfiltrate OneDrive Business OCR Data☆113Updated 5 months ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆120Updated 6 months ago
- macos stealer poc☆117Updated 2 months ago
- Dig your way out of networks like a Meerkat using SSH tunnels via ClickOnce.☆195Updated last month
- Modular framework for automating triaging, malware analysis, and analyst workflows☆41Updated last month
- ☆135Updated 2 weeks ago
- Python3 utility for creating zip files that smuggle additional data for later extraction☆234Updated last month
- ☆149Updated 2 months ago
- A powerful, modular, lightweight and efficient command & control framework written in Nim.☆147Updated 2 months ago
- ☆109Updated 3 weeks ago
- Evade EDR's the simple way, by not touching any of the API's they hook.☆147Updated 4 months ago
- A delicious, but malicious SSL-VPN server 🌮☆233Updated 2 weeks ago
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆82Updated 4 months ago
- The CIA's Marble Framework is designed to allow for flexible and easy-to-use obfuscation when developing tools.☆299Updated last year
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated 2 months ago
- Pack/Encrypt/Obfuscate ELF + SHELL scripts☆316Updated 3 weeks ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆260Updated 7 months ago
- A collection of tools that I use in CTF's or for assessments☆100Updated 4 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆193Updated 3 months ago
- ZeroProbe is an advanced enumeration and analysis framework designed for exploit developers, security researchers, and red teamers. It pr…☆105Updated 3 months ago
- ☆133Updated 3 months ago
- ☆161Updated 2 months ago
- PowerShell script to dump Microsoft Defender Config, protection history and Exploit Guard Protection History (no admin privileges requir…☆149Updated last year
- lolC2 is a collection of C2 frameworks that leverage legitimate services to evade detection☆224Updated 3 weeks ago
- ☆102Updated 2 months ago
- WMI virus, because funny☆282Updated 4 months ago
- In-Memory Rootkit For Linux☆70Updated 2 weeks ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆195Updated 3 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆186Updated 2 months ago
- A script to generate AV evaded(static) DLL shellcode loader with AES encryption.☆130Updated 3 months ago