ic4rta / Guia-MalDevLinks
Pequeña guia que hice sobre el desarrollo de malware y tecnicas que son usadas
☆28Updated 4 months ago
Alternatives and similar repositories for Guia-MalDev
Users that are interested in Guia-MalDev are comparing it to the libraries listed below
Sorting:
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆47Updated 11 months ago
- Educational Python implementation of RSA cryptosystem featuring key generation, encryption/decryption, and Base64 key exchange. Designed …☆10Updated last month
- ☆19Updated 2 months ago
- Malicious Macro Generator for LibreOffice/OpenOffice☆32Updated 2 years ago
- Herramienta donde puedes practicar las vulnerabilidades web más conocidas. Email: info@webvulnlab.org☆61Updated 2 months ago
- Configuration files for desktop environment☆26Updated last year
- Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.☆22Updated last year
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆52Updated 6 months ago
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆24Updated 11 months ago
- Local File Inclusion Enumeration (PoC)☆60Updated 11 months ago
- Vault de Obsidian Apuntes BSCP (Suscribete a Kr4k3nEU chaval)☆15Updated last year
- Extracción de subdominios utilizando el servicio de crt.sh, comprobando los certificados TLS/SSL registrados del dominio.☆16Updated 5 months ago
- Bash script that perform all the setup for BSPWM installation, including polybar, picom, pywal,nvchad, with multiple color schemes and a …☆30Updated 2 weeks ago
- Heavily obfuscated PowerShell reverse shell that can bypass Windows Defender☆19Updated 5 months ago
- Exploits for some windows binaries :)☆47Updated 5 months ago
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Updated 2 months ago
- Enhance Your Active Directory Spraying with User Information.☆18Updated 4 months ago
- Script made for bypassing antivirus using Powershell Injection method. Place your shellcode from msfvenom on line 15, the script can be c…☆12Updated 2 years ago
- Monta tu laboratorio para preparar la certificación eCPPT☆18Updated 2 years ago
- Local File Inclusion To Remote Command Execution (PoC)☆49Updated 2 years ago
- Cosas copypaste☆14Updated last year
- Null-AMSI is an AMSI and ETW bypass that takes advantage of .NET types (.NET Reflection) to bypassing AV/EDR.☆69Updated 3 weeks ago
- Blog personal sobre resolución de CTF's, artículos y demás cosas locas en ciberseguridad :)☆16Updated 3 weeks ago
- PDF dropper Red Team Scenairos☆212Updated 10 months ago
- Sliver CheatSheet for OSEP☆86Updated 3 weeks ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆308Updated 3 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆388Updated 5 months ago
- A simple and stealthy reverse shell written in Nim that bypasses Windows Defender detection. This tool allows you to establish a reverse …☆109Updated last year
- Reverse shell that can bypass windows defender detection☆166Updated last year
- Exploits for some linux binaries :)☆36Updated 5 months ago