My metasploit modules
☆24Jan 8, 2016Updated 10 years ago
Alternatives and similar repositories for metasploit_modules
Users that are interested in metasploit_modules are comparing it to the libraries listed below
Sorting:
- Scripts for communication with Bunitu Trojan C&Cs☆19Oct 29, 2015Updated 10 years ago
- A CMake template for projects using MS Detours☆23Feb 18, 2025Updated last year
- Sample libraries to be used with IAT Patcher☆37Oct 1, 2022Updated 3 years ago
- Decoders for 7ev3n ransomware☆17Oct 24, 2016Updated 9 years ago
- ☆23Feb 3, 2021Updated 5 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- ☆18Jun 25, 2024Updated last year
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Python wrappers for mal_unpack☆37Sep 19, 2023Updated 2 years ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆24Oct 23, 2021Updated 4 years ago
- Self contained phish endpoint generator and web server.☆11Mar 5, 2015Updated 10 years ago
- Bash Shell Script Cryptography☆13Jan 2, 2022Updated 4 years ago
- Set of my small utils related to cryptography, encoding, decoding etc☆95Sep 1, 2025Updated 6 months ago
- Rasta's mouse AMSI patch but with function that makes it undetectable.☆14Apr 21, 2021Updated 4 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- PHP Source Code Analyzer written in Perl (taint checking)☆18May 11, 2020Updated 5 years ago
- Another Portable Executable files analysing stuff☆21May 28, 2011Updated 14 years ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- Repository to gather the .NET malware I will be developing☆18Mar 23, 2025Updated 11 months ago
- Firmware Reversing Repo :p☆17Oct 11, 2015Updated 10 years ago
- Directory with Bluetooth exploits that is used in BlueToolkit☆21Sep 30, 2025Updated 5 months ago
- WiFi arsenal☆17May 19, 2020Updated 5 years ago
- Default Password Generator for Time Warner / Spectrum Routers☆19Jul 27, 2017Updated 8 years ago
- Demo bootloaders - created just for fun☆23Jul 1, 2017Updated 8 years ago
- A small library helping to parse commandline parameters (for C/C++)☆57May 25, 2025Updated 9 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆27Aug 18, 2024Updated last year
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Application for random attack on Green Petya's key☆25Jul 4, 2017Updated 8 years ago
- Parser for a custom executable formats from Hidden Bee and Rhadamanthys malware☆58Aug 6, 2025Updated 6 months ago
- My small projects writen in 16 bit asm (NOTE: those are my practice projects that I wrote when I was 15, I give no warranty for this code…☆23Oct 14, 2021Updated 4 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- A demo implementation of a well-known technique used by some malware to evade userland hooking, using my library: libpeconv.☆22Apr 13, 2018Updated 7 years ago
- yara rules for cryptography detection☆31Apr 28, 2014Updated 11 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- An experimental dynamic malware unpacker based on Intel Pin and PE-sieve☆63Aug 21, 2024Updated last year
- Run you Localhost Server☆27Oct 13, 2024Updated last year