A solution to create obfuscated download cradles for PowerShell.
☆16Aug 1, 2022Updated 3 years ago
Alternatives and similar repositories for Get-DownloadCradle
Users that are interested in Get-DownloadCradle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Using PowerShell to quickly scan through the SYSVOL share for exposed credentials within auto logon policies.☆14Nov 30, 2022Updated 3 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Jan 16, 2021Updated 5 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Oct 6, 2022Updated 3 years ago
- A PowerShell solution to discover visible SMB shares, test for access rights, inventory accessible files and flag human readable file con…☆27Mar 13, 2023Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- A script to exploit CVE-2020-14144 - GiTea authenticated Remote Code Execution using git hooks☆31Mar 17, 2026Updated last month
- An in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.☆286Aug 5, 2022Updated 3 years ago
- A solution to create obfuscated reverse shells for PowerShell.☆83Aug 1, 2022Updated 3 years ago
- Use IronPython directly in your code without IronPython DLLs and dependencies☆12Jan 19, 2022Updated 4 years ago
- My personal website, built with Next.js, Tailwind CSS, and Radix UI. Deployed on Vercel.☆13Oct 22, 2024Updated last year
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Jan 16, 2021Updated 5 years ago
- Two-way Git-Git and Git-Mercurial repository syncing Windows service used by Git-hg Mirror (https://githgmirror.com). Git-hg Mirror is re…☆11Jan 22, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆10Jul 28, 2021Updated 4 years ago
- CLI Chrome Extension (CRX) Packer written in Python☆16Nov 2, 2013Updated 12 years ago
- An aggressor script for Cobalt Strike to query Windows' GetLastError messages☆18Sep 25, 2022Updated 3 years ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Distribuição Linux voltada para dispositivos embarcados, customizada por membros do LHC para o desenvolvimento e projetos pessoais para e…☆10Dec 20, 2023Updated 2 years ago
- Using Spotify Playlists as Malware CDN☆26Feb 1, 2021Updated 5 years ago
- DLL Hollowing PoC - Remote and Self shellcode injection☆85Nov 10, 2021Updated 4 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- The Cayosin Bot features unique RHex STD and RHex HTTP attacks. Meaning that the Hex Strings are randomly selected. Cayosin also contains…☆14Sep 29, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Collection of Offensive C# Tooling☆13Nov 4, 2021Updated 4 years ago
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- findLoop - find possible encryption/decryption or compression/decompression code☆28Mar 30, 2019Updated 7 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆28Dec 29, 2021Updated 4 years ago
- ☆12Sep 29, 2021Updated 4 years ago
- My blog and its static site generator☆10Oct 28, 2024Updated last year
- My configurations☆29Apr 26, 2026Updated last week
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python script for SAP secure storage decrypton☆13Mar 14, 2018Updated 8 years ago
- You don't need wires to be connected☆43Apr 8, 2020Updated 6 years ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container☆11Dec 16, 2017Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- POC for CVE-2023-29360☆12Aug 31, 2024Updated last year
- POC for CVE-2023-24488☆14Jul 4, 2023Updated 2 years ago
- A collection of code snippets built to assist with breaking chains.☆128Apr 24, 2024Updated 2 years ago