emmaunel / FluffyLinks
This is my own programming language called fluffy(similar to python)
☆13Updated 5 years ago
Alternatives and similar repositories for Fluffy
Users that are interested in Fluffy are comparing it to the libraries listed below
Sorting:
- autopwn + deployment☆15Updated 3 years ago
- Custom SOCKS proxy for redteam☆12Updated 3 years ago
- PE File Blessing - To continue or not to continue☆87Updated 5 years ago
- Deploy redteam infrastructure☆16Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Updated 5 years ago
- In line function hooking LKM rootkit☆52Updated 5 years ago
- ELK stack for red team logs☆12Updated 4 years ago
- Command and Control that uses NTP as the transport protocol.☆21Updated 3 years ago
- shell for nasm☆64Updated 5 years ago
- Raw socket library/framework for red team events☆34Updated 2 years ago
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- Windows GPU rootkit PoC by Team Jellyfish☆36Updated 10 years ago
- Dumping credentials through windbg and pykd☆41Updated last year
- Local Privilege Escalation Miner☆29Updated 3 years ago
- ☆28Updated 6 years ago
- A list of windows potatoes!☆25Updated 3 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆40Updated 5 years ago
- Keep it secret, keep it safe☆78Updated 6 months ago
- Exploits made practicing for OSCE☆23Updated 4 years ago
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12Updated 2 years ago
- Repo for The Crown: Exploratory Analysis of Nim Malware DEF CON 615 talk☆46Updated 3 years ago
- Offensive go lang series☆35Updated 5 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- Windows NTLM Authentication Backdoor☆18Updated 3 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆35Updated 5 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆33Updated 3 years ago
- NT AUTHORITY\SYSTEM☆39Updated 5 years ago
- ☆13Updated 10 years ago
- Run commands on linux through those pesky firewalls☆26Updated 10 years ago