An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet ๐
โ15Feb 16, 2021Updated 5 years ago
Alternatives and similar repositories for endgame
Users that are interested in endgame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Sharp Suiteโ15Dec 28, 2019Updated 6 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.โ16Jun 2, 2016Updated 9 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other thaโฆโ19Apr 30, 2016Updated 9 years ago
- Work files for my blog post "Code Caving in a PE file.โ16Dec 18, 2016Updated 9 years ago
- Python tool to find vulnerable AD object and generating csv reportโ26Jul 4, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform โข AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- TypeScript/JavaScript client libraries for Sliverโ25Mar 15, 2026Updated last week
- Malsys is a project designed to validate and analyze files for potential malware signatures.โ21Nov 5, 2023Updated 2 years ago
- โ13May 21, 2025Updated 10 months ago
- PE obfuscator with Evasion in mindโ213Apr 25, 2023Updated 2 years ago
- A kalilinux/kali-rolling container with extra juice.โ20Jan 5, 2026Updated 2 months ago
- Ubuntu based privateinternetaccess.com Proxy Box with Squid(http proxy), Deluge (torrenting including port mapping), Dante(Socks5)โ21Dec 19, 2024Updated last year
- Automatically spin up infra for phishingโ63Feb 1, 2020Updated 6 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.โ28Oct 19, 2023Updated 2 years ago
- C# code to run PIC using CreateThreadโ17Apr 19, 2019Updated 6 years ago
- Virtual machines for every use case on DigitalOcean โข AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Simple Linux RootKit written in pythonโ10Dec 10, 2017Updated 8 years ago
- Mr.Robot - DIY Self Balancing Robot Projectโ10Oct 25, 2017Updated 8 years ago
- Suite for Information gatheringโ12Jul 2, 2018Updated 7 years ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastructโฆโ12Jun 12, 2019Updated 6 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.โ20Jul 31, 2019Updated 6 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed byโฆโ16May 6, 2024Updated last year
- How to install a PCE simplified.โ17Jan 11, 2026Updated 2 months ago
- Packer for PE and ELF, 32 and 64bits.โ22Aug 5, 2013Updated 12 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentationโฆโ20Sep 18, 2017Updated 8 years ago
- Virtual machines for every use case on DigitalOcean โข AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Breaching physical security, and generally causing mayhem, with wireless signalsโ15Mar 19, 2017Updated 9 years ago
- โ11Jul 29, 2025Updated 7 months ago
- Loads .NET Assembly Via CLR Loaderโ17Mar 6, 2019Updated 7 years ago
- PyTest Salt Pluginโ13Jan 27, 2020Updated 6 years ago
- Simple PE Packer Which Encrypts .text Sectionโ50May 28, 2017Updated 8 years ago
- Docker container to build custom firecracker root drive imagesโ14Jan 21, 2021Updated 5 years ago
- A scanner for DKIM selectors.โ12Nov 5, 2018Updated 7 years ago
- A curated list of tools and techniques written from experience in weaponization of malwareโ41Oct 26, 2023Updated 2 years ago
- NTLMRelay for MS Exchangeโ11Nov 13, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean โข AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Developer enhancements (DX) for FalconPy, the CrowdStrike Python SDKโ48Mar 17, 2026Updated last week
- Data exfiltration utility for testing detection capabilitiesโ56Jan 13, 2022Updated 4 years ago
- Artemis - C++ Hell's Gate Syscall Implementationโ34Aug 16, 2023Updated 2 years ago
- POC for .NET mssql client for accessing database data through beaconโ64Sep 12, 2023Updated 2 years ago
- โจ Brand Indicators for Message Identification or BIMI ( ๐ข pronounced: Bih-mee) is an emerging email ๐ง specification that enables the usโฆโ10Mar 6, 2024Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira ticketsโ51Dec 8, 2022Updated 3 years ago
- Rust in-memory dumperโ108Jul 26, 2023Updated 2 years ago