guitmz / nastyView external linksLinks
Reverse text segment x64 ELF infector written in Assembly
☆20Oct 16, 2021Updated 4 years ago
Alternatives and similar repositories for nasty
Users that are interested in nasty are comparing it to the libraries listed below
Sorting:
- ShootCutMe an .LNK file creator tool for redteamer☆15Oct 2, 2024Updated last year
- Just some fun utilities I wrote for productivity reasons.☆30Mar 9, 2023Updated 2 years ago
- Very basic dll injector written in zig, for windows. Assumes the injector, target process, and dll are of the same bitness. Usage: ./inje…☆29Jun 9, 2020Updated 5 years ago
- ☆26Sep 29, 2022Updated 3 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 3 years ago
- ☆31Oct 1, 2021Updated 4 years ago
- This Tool Is For Styling Termux.By This Tool You Will Get a Login Method.Also You Can Remove Any Types Of Banner By This Tool☆12Jan 24, 2024Updated 2 years ago
- A Flask-based HTTP(S) command and control (C2) with a web frontend. Malleable agent written in Go.☆36Aug 12, 2023Updated 2 years ago
- ☆11Nov 11, 2022Updated 3 years ago
- ☆10Oct 18, 2024Updated last year
- A small tool to unmap PE memory dumps.☆11Nov 9, 2023Updated 2 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- ☆12Feb 8, 2021Updated 5 years ago
- a program can dump all marshal in obf code by KhanhNguyen9872☆18Nov 11, 2023Updated 2 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated last year
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- A curated list of Rust code and resources. With repository stars⭐ and forks🍴☆14Updated this week
- Lightweight, low-dependency wrapper for basic WMI functionality on Windows.☆14Jan 27, 2026Updated 2 weeks ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- ☆10Nov 5, 2018Updated 7 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- Distributed phishing framework designed to streamline offensive security phishing☆41Feb 16, 2023Updated 3 years ago
- 支持10万人同时在线Go语言打造高并发web即时聊天(IM)应用☆12Feb 10, 2022Updated 4 years ago
- a clone of the new classic 2048 game, written in 8086 assembly for DOS and the bootsector☆10Jul 13, 2020Updated 5 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- A pure Python implementation for TA-LIB based on Cython (Progress: 92/158 Indicators)☆15Jul 27, 2025Updated 6 months ago
- simple C# portscanner - written for playing around with Metasploit's Execute-Assembly☆10Jul 1, 2023Updated 2 years ago
- Decompiler of python executable files created in pyinstaller and pyarmor and decompiler of .pyc files☆13May 8, 2022Updated 3 years ago
- Easy Anti PatchGuard☆10Apr 9, 2021Updated 4 years ago
- Volatility 3 plugins to extract a module as complete as possible☆12Jun 13, 2023Updated 2 years ago
- internal splitgate cheat. esp only, good base☆10Aug 22, 2021Updated 4 years ago
- Mini CTF for TempleOS☆11Jun 19, 2020Updated 5 years ago
- Visually analyze basic block code coverage in Binary Ninja using Pin output.☆11Oct 6, 2017Updated 8 years ago
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- The Tool will fetch the article links for you, based on your query. Enter anything you want to search, whether a vulnerability descriptio…☆10Jan 2, 2021Updated 5 years ago
- Private Server for QPang AKA Manga Fighters☆11Oct 11, 2024Updated last year
- Code Coverage client for DynamoRIO☆12Jan 20, 2019Updated 7 years ago
- Multiplayer snake game written at a single weekend☆13Jul 10, 2019Updated 6 years ago