keklick1337 / PhantomGateLinks
Minimalistic port-spoofer written in Python
☆11Updated 7 months ago
Alternatives and similar repositories for PhantomGate
Users that are interested in PhantomGate are comparing it to the libraries listed below
Sorting:
- A TikTok - Live Watcher application for tty / cli - for the unlikely situation when you live in tty, but want to watch TikTok Live.☆27Updated 11 months ago
- b3acon - a mail-based C2 that communicates via an in-memory C# IMAP client dynamically compiled in memory using PowerShell.☆40Updated 4 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- UAC Bypass using CMSTP in Rust☆32Updated 8 months ago
- Exfiltrate data over audio output from remote desktop sessions - Covert channel PoC☆62Updated 9 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- Attack tool for altering packed samples so that they evade static packing detection☆19Updated 7 months ago
- GitHub CVE Repository Hunt☆18Updated last year
- A slightly more fun way to disable windows defender☆44Updated 4 months ago
- Yandex browser password recovery☆11Updated 4 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆18Updated 3 months ago
- 🤖 The Modern, Blazing Fast Port Scanner 🤖☆28Updated 8 months ago
- ☆17Updated 10 months ago
- Share threat intelligence and detect tools about APT "NightEgle" (APT-Q-95)☆37Updated 2 months ago
- In-Memory Rootkit For Linux and BSD☆78Updated 3 weeks ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆61Updated 3 weeks ago
- My shellcodes (or shellcodish-things) written for educational purpose in NASM assembly.☆40Updated last year
- This Python-based GUI application allows you to track the latest security vulnerabilities (CVEs) using the☆39Updated 5 months ago
- ☆19Updated 2 months ago
- This is the repository for indicators of compromise (IOCs) and other data for threat intelligence articles posted on the Palo Alto Networ…☆92Updated 3 weeks ago
- Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G & 4G/LTE Routers☆81Updated this week
- Another Hardening Windows Tool☆51Updated last year
- ExeRay AI detects malicious Windows executables using ML. Analyzes entropy, imports, and metadata for rapid classification, aiding incide…☆50Updated 3 weeks ago
- PackageSpy is a versatile command-line tool designed to simplify the process of searching for packages on two popular package managers☆22Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 5 months ago
- A scalable web app features LiveView authentication, user roles and permission system, and secure S3/Wasabi uploads. It calculates file h…☆86Updated 4 months ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated 7 months ago
- .NET tool used to enrich RPC telemetry☆98Updated 2 months ago
- Windows And Ways To Break It☆99Updated last year