An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet ๐
โ16Feb 16, 2021Updated 5 years ago
Alternatives and similar repositories for endgame
Users that are interested in endgame are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Compiled Binaries for Sharp Suiteโ15Dec 28, 2019Updated 6 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.โ16Jun 2, 2016Updated 9 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other thaโฆโ19Apr 30, 2016Updated 10 years ago
- Work files for my blog post "Code Caving in a PE file.โ16Dec 18, 2016Updated 9 years ago
- Python tool to find vulnerable AD object and generating csv reportโ26Jul 4, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer โข AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- TypeScript/JavaScript client libraries for Sliverโ27Apr 17, 2026Updated 2 weeks ago
- โ35Aug 13, 2023Updated 2 years ago
- โ13May 21, 2025Updated 11 months ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.โ21Nov 5, 2023Updated 2 years ago
- PE obfuscator with Evasion in mindโ213Apr 25, 2023Updated 3 years ago
- A kalilinux/kali-rolling container with extra juice.โ20Jan 5, 2026Updated 4 months ago
- Ubuntu based privateinternetaccess.com Proxy Box with Squid(http proxy), Deluge (torrenting including port mapping), Dante(Socks5)โ21Dec 19, 2024Updated last year
- Automatically spin up infra for phishingโ63Feb 1, 2020Updated 6 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.โ28Oct 19, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer โข AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- C# code to run PIC using CreateThreadโ17Apr 19, 2019Updated 7 years ago
- Simple Linux RootKit written in pythonโ10Dec 10, 2017Updated 8 years ago
- Drop a single binary into a compromised Kubernetes pod and instantly map every realistic attack path to cluster-admin, node escape, secโฆโ146Apr 23, 2026Updated last week
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastructโฆโ12Jun 12, 2019Updated 6 years ago
- Suite for Information gatheringโ12Jul 2, 2018Updated 7 years ago
- Modular Antenna Tracker Caddyโ11Nov 14, 2023Updated 2 years ago
- โ20Nov 1, 2022Updated 3 years ago
- Source code on the 1.44MB 3.5 floppy accompanying the Windows NT File System Internals book.โ20Jul 31, 2019Updated 6 years ago
- Process Ghosting is a technique in which a process is created from a delete pending file. This means the created process is not backed byโฆโ16May 6, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI โข AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- How to install a PCE simplified.โ17Mar 29, 2026Updated last month
- Packer for PE and ELF, 32 and 64bits.โ22Aug 5, 2013Updated 12 years ago
- The project was upgraded from https://coder.pub/ and supported VS2017. The original author wrote the detailed design ideas documentationโฆโ20Sep 18, 2017Updated 8 years ago
- PyTest Salt Pluginโ13Jan 27, 2020Updated 6 years ago
- Loads .NET Assembly Via CLR Loaderโ17Mar 6, 2019Updated 7 years ago
- Simple PE Packer Which Encrypts .text Sectionโ50May 28, 2017Updated 8 years ago
- A scanner for DKIM selectors.โ14Nov 5, 2018Updated 7 years ago
- A curated list of tools and techniques written from experience in weaponization of malwareโ41Oct 26, 2023Updated 2 years ago
- NTLMRelay for MS Exchangeโ11Nov 13, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI โข AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Data exfiltration utility for testing detection capabilitiesโ56Jan 13, 2022Updated 4 years ago
- Artemis - C++ Hell's Gate Syscall Implementationโ34Aug 16, 2023Updated 2 years ago
- POC for .NET mssql client for accessing database data through beaconโ64Sep 12, 2023Updated 2 years ago
- โจ Brand Indicators for Message Identification or BIMI ( ๐ข pronounced: Bih-mee) is an emerging email ๐ง specification that enables the usโฆโ10Mar 6, 2024Updated 2 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira ticketsโ52Dec 8, 2022Updated 3 years ago
- Rust in-memory dumperโ108Jul 26, 2023Updated 2 years ago
- Webshell, Virtual Private Server (VPS) and cPanel Databaseโ39Sep 2, 2022Updated 3 years ago