emmaunel / FluffyLinks
This is my own programming language called fluffy(similar to python)
☆13Updated 5 years ago
Alternatives and similar repositories for Fluffy
Users that are interested in Fluffy are comparing it to the libraries listed below
Sorting:
- Deploy redteam infrastructure☆17Updated 4 years ago
- PE File Blessing - To continue or not to continue☆87Updated 6 years ago
- Custom SOCKS proxy for redteam☆13Updated 3 years ago
- Local Privilege Escalation Miner☆32Updated 3 years ago
- Raw socket library/framework for red team events☆33Updated 2 years ago
- Command and Control that uses NTP as the transport protocol.☆26Updated 4 years ago
- autopwn + deployment☆15Updated 3 years ago
- Resources I've found helpful for learning computing security.☆14Updated 6 years ago
- At some point, I learned about a method to perform a binary search on a file in order to identify its AV signature and change it to bypas…☆36Updated 5 years ago
- shell for nasm☆65Updated 5 years ago
- Sustainable shellcode evasion☆112Updated last year
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34Updated 3 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Linux rust keylogger☆18Updated last year
- NGINX module to allow for RCE through a specific header☆27Updated 3 years ago
- A security competition scoring system built on the Elastic stack.☆41Updated last month
- A Visual Studio Code Extension agent for Mythic C2☆71Updated last year
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆24Updated 7 years ago
- ELK stack for red team logs☆13Updated 5 years ago
- various slides and presentations I've worked on☆19Updated 10 months ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- Encode binary as English text over HTTP(s)☆30Updated 2 years ago
- Python 3 server used to control SK8RAT implant☆36Updated 5 years ago
- ☆28Updated 6 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆21Updated 6 years ago
- Keep it secret, keep it safe☆80Updated last year
- Red Team Operator: Malware Development Essentials Course☆99Updated 5 years ago
- From directory deletion to SYSTEM shell☆111Updated 5 years ago
- Caesar-Cipher based encryption☆29Updated 4 years ago
- Proper Payload Protection Prevents Poor Performance☆76Updated 3 years ago