iTrooz / nmap-appimageLinks
A self-contained nmap package, using the AppImage format, for use in compromised systems
☆11Updated last year
Alternatives and similar repositories for nmap-appimage
Users that are interested in nmap-appimage are comparing it to the libraries listed below
Sorting:
- A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.☆858Updated 5 months ago
- Simple volatility profile builder based on Docker container☆21Updated 5 years ago
- A tutorial on using JohnTheRipper and Hashcat to crack lost keepass passwords☆69Updated 4 years ago
- Network analysis tool for Attack Defence CTF☆355Updated 2 months ago
- Fingerprinting TCP/IP☆34Updated last year
- This is the updated script from https://teamrocketist.github.io/2017/08/29/Forensics-Hackit-2017-USB-ducker/☆109Updated 4 years ago
- Statically-linked ssh server with reverse shell functionality for CTFs and such☆996Updated 2 years ago
- Kernel exploitation technique☆577Updated last year
- Execute ELF files without dropping them on disk☆495Updated last year
- Bad char generator to instruct encoders such as shikata-ga-nai to transform those to other chars.☆292Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆912Updated last year
- Connect like there is no firewall. Securely.☆1,732Updated 2 months ago
- Windows kernel and user mode emulation.☆1,746Updated 5 months ago
- High Octane Triage Analysis☆767Updated this week
- Python Command-Line Ghidra Binary Diffing Engine☆671Updated last month
- ConPtyShell - Fully Interactive Reverse Shell for Windows☆1,141Updated 2 years ago
- Easily manage Linux Chroot(s) and Containers with Atoms.☆421Updated last year
- pwninit - automate starting binary exploit challenges☆979Updated last year
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆566Updated last year
- Dock most applications to the system tray☆344Updated 8 months ago
- Dark theme installer for Ghidra☆582Updated 2 years ago
- ☆503Updated last year
- Identifies the bytes that Microsoft Defender flags on.☆2,513Updated last year
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,158Updated 2 years ago
- Original PoC for CVE-2023-32784☆645Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆1,285Updated last year
- Writeups for CTF challenges☆21Updated last year
- A collection of pwn/CTF related utilities for Ghidra☆688Updated 11 months ago
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆1,603Updated 3 years ago
- MD5-Monomorphic Shellcode Packer - all payloads have the same MD5 hash☆791Updated 2 years ago