A collection of tools created for computer security research purposes.
☆136Feb 2, 2026Updated 3 weeks ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆51Feb 2, 2026Updated 3 weeks ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆181Feb 2, 2026Updated 3 weeks ago
- Papers, presentations and documents from the team at Hacker House.☆52Feb 2, 2026Updated 3 weeks ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆463Updated this week
- cve-2018-10933 libssh authentication bypass☆109Feb 2, 2026Updated 3 weeks ago
- rebirth IOS11 - 11.3.1 jailbreak security research utility☆26Feb 2, 2026Updated 3 weeks ago
- AES-256 Microsoft Cryptography API Example Use.☆34Feb 2, 2026Updated 3 weeks ago
- CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation☆23Feb 2, 2026Updated 3 weeks ago
- Offensive Lua.☆223Feb 2, 2026Updated 3 weeks ago
- ☆11Feb 12, 2023Updated 3 years ago
- This is a malware repo. Use them at your own risk. This is strictly for educational purposes only.☆12May 22, 2019Updated 6 years ago
- A Python-Based script designed to output stable and screen-scrapable lists of wireless networks☆15Jun 19, 2014Updated 11 years ago
- Crypter thingy I made for avoiding automated anti-malware environments. This is to be used for EDUCATIONAL PURPOSES ONLY.☆12Sep 6, 2019Updated 6 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- ☆15Apr 17, 2025Updated 10 months ago
- CIA UAC bypass implementation that utilizes elevated COM object to write to System32 and an auto-elevated process to execute as administr…☆183Feb 2, 2026Updated 3 weeks ago
- ☆20Mar 21, 2024Updated last year
- ☆20May 1, 2023Updated 2 years ago
- Red-Teaming TempleOS.☆17Jul 29, 2022Updated 3 years ago
- C# havoc implant☆100Feb 12, 2023Updated 3 years ago
- ☆13Jul 13, 2020Updated 5 years ago
- A BOF that suspends non-GUI threads for a target process or resumes them resulting in stealthy process silencing.☆57Apr 14, 2025Updated 10 months ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- a windows kernel keylogger that works☆20Feb 12, 2024Updated 2 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- Detonate malware on VMs and get logs & detection status☆83Jan 29, 2026Updated last month
- Hide Port In Windows☆42Oct 24, 2024Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- A remote administration tool for Windows, written in C#☆36Mar 15, 2021Updated 4 years ago
- Code Execution & Persistence in NETWORK SERVICE FAX Service☆35Feb 2, 2026Updated 3 weeks ago
- ☆22Jun 9, 2025Updated 8 months ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆116Feb 12, 2019Updated 7 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Jan 17, 2020Updated 6 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Mythic C2 wrapper for NimSyscallPacker☆25Mar 12, 2025Updated 11 months ago
- Dropping a powershell script at %HOMEPATH%\Documents\WindowsPowershell\ , that contains the implant's path , and whenever powershell pro…☆85Aug 2, 2023Updated 2 years ago
- Patching "signtool.exe" to accept expired certificates for code-signing.☆340Feb 2, 2026Updated 3 weeks ago
- UAC bypass for x64 Windows 7 - 11☆831Feb 2, 2026Updated 3 weeks ago