Simple example windows batch file "compiler". (Post-compilation embedded resource)
☆21Feb 1, 2012Updated 14 years ago
Alternatives and similar repositories for win32-bat2exe
Users that are interested in win32-bat2exe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A open source ransomware.☆11Apr 8, 2017Updated 8 years ago
- Sentinel Guard - Use to build up Honeypot and Honeynet with ZERO cost easily and simply.☆18Jul 25, 2021Updated 4 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Sep 23, 2015Updated 10 years ago
- Windows安全防火墙☆14Aug 25, 2020Updated 5 years ago
- Make a cheap TOR router for $10☆18Oct 11, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Automatic extract anomalious Web attack Payloads with Unsupervised Machine Learning algorithms☆36Sep 24, 2018Updated 7 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Create custom Windows batch files from a configuration file☆32Oct 29, 2016Updated 9 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Search bing with python☆12Sep 25, 2014Updated 11 years ago
- Save a screenshot of the Windows desktop from command line☆16Aug 2, 2016Updated 9 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- 检测邮件发送的可行性,可用来红队作战中对目标邮箱账户测试。The feasibility sent by the detection mail can be used for the target mailbox account test in the Red Team b…☆10May 8, 2023Updated 2 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 8 years ago
- ☆11Feb 21, 2016Updated 10 years ago
- UAC-ByPass utils☆11Jan 28, 2022Updated 4 years ago
- all things awesome security☆14Jan 11, 2016Updated 10 years ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Collection of scripts that I have used on Red Team engagements☆16Feb 15, 2018Updated 8 years ago
- introduction to distributed scanning using vultr☆10Apr 29, 2017Updated 8 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Sep 25, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 一款支持微信和QQ、UC手机浏览器的分享工具,可以自定义标题、链接、icon等☆12Apr 19, 2018Updated 7 years ago
- Use a LLM to create the ultimate Leek AI for Leek Wars! 🥬☆16May 2, 2024Updated last year
- This is a repository for the public blog with Labs indicators of compromise and code☆18Jan 8, 2020Updated 6 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- PowerShell functions, scripts and modules☆15Dec 11, 2016Updated 9 years ago
- Set of utilities for getting information about Windows Events☆15Jun 5, 2018Updated 7 years ago
- 哥斯拉源码-v3.03-godzilla☆11May 12, 2022Updated 3 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- toolkit repository: command line cheatsheet, operation script and so on.☆14Jul 9, 2023Updated 2 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Enterprise Security Response Center Development Framework☆11Jan 2, 2017Updated 9 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- ☆13Nov 1, 2017Updated 8 years ago
- 微软签名缺陷利用,老技术☆18Aug 10, 2021Updated 4 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- 甲方企业安全建设开源之路☆10Oct 11, 2018Updated 7 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago