A solution to create obfuscated download cradles for PowerShell.
☆16Aug 1, 2022Updated 3 years ago
Alternatives and similar repositories for Get-DownloadCradle
Users that are interested in Get-DownloadCradle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆83Aug 1, 2022Updated 3 years ago
- My personal website, built with Next.js, Tailwind CSS, and Radix UI. Deployed on Vercel.☆13Oct 22, 2024Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- Using Spotify Playlists as Malware CDN☆26Feb 1, 2021Updated 5 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Nov 10, 2021Updated 4 years ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Mar 16, 2026Updated last week
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- WebSocket Penetration Testing Toolkit for Burp Suite☆29Mar 5, 2026Updated 3 weeks ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆15Sep 29, 2020Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆15Dec 5, 2020Updated 5 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆12Sep 29, 2021Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- My blog and its static site generator☆10Oct 28, 2024Updated last year
- Python script for SAP secure storage decrypton☆13Mar 14, 2018Updated 8 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 5 years ago
- Proof of conept to exploit vulnerable proxycommand configurations on ssh clients☆19Dec 21, 2023Updated 2 years ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆34Jun 19, 2025Updated 9 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Payload delivery via URL and some social engineering.☆17Jul 13, 2024Updated last year
- Example of an ELF parser to learn about the ELF format☆11Oct 6, 2024Updated last year
- Simple EDR implementation to demonstrate bypass☆181May 27, 2020Updated 5 years ago
- A tech demo to play audio to the other party in a phone call☆14Jun 22, 2022Updated 3 years ago
- ☆87Jan 21, 2025Updated last year