echo-devim / NoCrypt
AntiRansomware Linux Kernel Module
☆37Updated last year
Related projects: ⓘ
- exfiltration/infiltration toolkit☆23Updated 9 months ago
- ☆50Updated 5 months ago
- VirusTotal Stealer is a DATA Exfiltration tool that exfitrate office documents and tunnel them over VirusTotal API to the Team Server☆62Updated 11 months ago
- badger-builder is an AI-assisted tool for generating dynamic Brute Ratel C4 profiles☆53Updated 2 months ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆33Updated 6 months ago
- A project created with an aim to emulate and test exfiltration of data over different network protocols.☆30Updated last year
- ☆42Updated this week
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆74Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆39Updated last year
- ☆22Updated 9 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆41Updated last year
- ECC Public Key Cryptography☆33Updated 10 months ago
- ☆28Updated last year
- A PoC for achieving persistence via push notifications on Windows☆43Updated last year
- Automatically spider the result set of a Censys/Shodan search and download all files where the file name or folder path matches a regex.☆27Updated last year
- ☆24Updated last year
- BloodHound PowerShell client☆43Updated this week
- ☆35Updated 9 months ago
- PoC-Malware-TTPs☆48Updated last year
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆25Updated 2 years ago
- ☆23Updated last year
- ☆26Updated last month
- PoC showcasing new DarkGate Install Script retrieval technique via DNS TXT Record☆37Updated 9 months ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆14Updated 6 months ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆15Updated 8 months ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆77Updated 7 months ago
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆26Updated 5 months ago
- hiding in plain sight: part 2☆40Updated 2 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆33Updated last year
- ☆19Updated this week