ihack4falafel / SubRosaView external linksLinks
Basic tool to automate backdooring PE files
☆56Feb 24, 2022Updated 3 years ago
Alternatives and similar repositories for SubRosa
Users that are interested in SubRosa are comparing it to the libraries listed below
Sorting:
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 3 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Feb 20, 2019Updated 6 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆25Jul 7, 2017Updated 8 years ago
- Alphanumeric Shellcode (x86) Encoder☆75Feb 24, 2022Updated 3 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Collection of things made during my preparation to take on OSCE☆189Feb 24, 2022Updated 3 years ago
- Collection of things made during my preparation to take on OSEE☆102Jul 30, 2019Updated 6 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- PE Binary Shellcode Injector - Automated code cave discovery, shellcode injection, ASLR bypass, x86/x64 compatible☆76Nov 24, 2019Updated 6 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- ☆10Jan 17, 2022Updated 4 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆17May 7, 2021Updated 4 years ago
- A heuristic, python-based detector for fast-flux botnets.☆13Feb 24, 2012Updated 13 years ago
- v1版完成对PE头,区段,输入表的解析☆11Apr 16, 2018Updated 7 years ago
- Security audit script decreases info gathering from average of 5 minutes, to 20 seconds, and returns everything into a textfile.☆11Feb 3, 2024Updated 2 years ago
- A small utility to run raw code chunks in the executable memory area.☆17Feb 6, 2015Updated 11 years ago
- Rekall Memory Forensic Framework☆33Aug 5, 2019Updated 6 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 6 years ago
- File Capability Extractor☆14Jul 12, 2025Updated 7 months ago
- A small collection of AWS utilities, packaged as a single standalone binary.☆13Aug 23, 2023Updated 2 years ago
- Executables created while writing "Introduction to Manual Backdooring".☆80May 30, 2017Updated 8 years ago
- 64bit Windows 10 shellcode that adds user BOKU:SP3C1ALM0V3 to the system and the localgroups Administrators & "Remote Desktop Users"☆41May 3, 2021Updated 4 years ago
- Obfuscate payloads using IPv4, IPv6, MAC or UUID strings☆22Feb 17, 2024Updated last year
- A new binary injection technique, can easily go through any #CIG protected process and slip through all possible defenses without any inj…☆18Mar 8, 2018Updated 7 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- ☆13Oct 20, 2021Updated 4 years ago
- Basic file metadata gathering script☆21Apr 16, 2025Updated 9 months ago
- ☆318Apr 8, 2022Updated 3 years ago
- DLLirant is a tool to automatize the DLL Hijacking researches on a specified binary.☆323Sep 23, 2022Updated 3 years ago
- BoobSnail allows generating Excel 4.0 XLM macro. Its purpose is to support the RedTeam and BlueTeam in XLM macro generation.☆259Mar 6, 2025Updated 11 months ago
- A Scantime Crypter coded in Python 2.7☆15Aug 26, 2017Updated 8 years ago
- Get intelligence info (tags, mitre techniques, yara and more) and find similar malware in a fast and easy way☆19Jun 6, 2022Updated 3 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Windows Stagers to circumvent restrictive network environments☆68Sep 23, 2024Updated last year
- Execute ShellCode / "Inline-Assembler" in Python☆42Jan 3, 2017Updated 9 years ago