Using Spotify Playlists as Malware CDN
☆26Feb 1, 2021Updated 5 years ago
Alternatives and similar repositories for c2tify
Users that are interested in c2tify are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Brute-force script for finding azorult XOR key.☆14May 22, 2019Updated 6 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- Siber Yıldız 2020 CTF Soruları ve Çözümleri☆15Dec 28, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- This repo contain Android malware samples and analysis☆13Apr 3, 2021Updated 4 years ago
- ☆44Sep 22, 2022Updated 3 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Grabs all files from Discord'a CDN linked in a Discord Data Dump☆10May 31, 2019Updated 6 years ago
- A solution to create obfuscated download cradles for PowerShell.☆16Aug 1, 2022Updated 3 years ago
- PKK Terör Örgütü ile ilişkili 13 Nesneye yönelik genişletilmiş ve eğitilmiş YOLOV3 model ve weight dosyası☆20Feb 6, 2021Updated 5 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆18Aug 9, 2020Updated 5 years ago
- Malware persistence via COM DLL hijacking. C++ implementation example☆13May 2, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Shared reverse shell over Discord☆136Apr 18, 2021Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Apr 21, 2022Updated 3 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- https://twitch.com/scottsec adresinde yapılan yayınların arşiv, link ve kaynakların bulunduğu repo☆12Feb 1, 2021Updated 5 years ago
- x86 Assembly Code Examples for Blog Posts☆18Aug 2, 2022Updated 3 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- Powerful Python tool to analyze PDF documents☆26May 15, 2022Updated 3 years ago
- A repository with simple projects created for testing/learning purpose☆46Dec 18, 2025Updated 3 months ago
- Winsock accept() Backdoor Implant.☆118Feb 13, 2021Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A pwning environment, now on docker!☆18Jul 3, 2021Updated 4 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- ☆29May 4, 2021Updated 4 years ago
- ☆24Nov 28, 2021Updated 4 years ago
- Using syscall to load shellcode, Evasion techniques☆27Jul 18, 2021Updated 4 years ago
- 无模块注入工程 VS2008☆11Jul 23, 2018Updated 7 years ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Dec 26, 2021Updated 4 years ago
- Privilege escalation in Docker☆31Jun 30, 2022Updated 3 years ago
- ☆13Sep 15, 2018Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Use rpc null sessions to retrieve machine list, domain admin list, domain controllers☆13Dec 15, 2022Updated 3 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 5 years ago
- A collection of crypters, binders, mailers etc for M$ Windows☆24Apr 27, 2018Updated 7 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Phish password protected Excel-Files☆107Jan 17, 2024Updated 2 years ago
- Advanced scanner for CVE-2020-0796 - SMBv3 RCE☆15May 22, 2023Updated 2 years ago
- Socks 5 proxy☆12Aug 5, 2023Updated 2 years ago