Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen
☆16Jan 19, 2020Updated 6 years ago
Alternatives and similar repositories for encrypted-web-shell
Users that are interested in encrypted-web-shell are comparing it to the libraries listed below
Sorting:
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Source code of my KeygenMe V7 challenge☆22Jul 19, 2018Updated 7 years ago
- Python source random obfuscation☆11Sep 9, 2022Updated 3 years ago
- desktop screenshot☆29Apr 26, 2023Updated 2 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Arduino+Si5351 = Antenna/Network Analyzer☆13Feb 10, 2019Updated 7 years ago
- Open repository of binary sample collections for binary analysis.☆16Apr 20, 2021Updated 4 years ago
- ☆28Oct 5, 2020Updated 5 years ago
- Installs And Executes Shellcode☆12Jul 26, 2015Updated 10 years ago
- Better-xNet - a fork of the original xNet library☆11Jan 8, 2020Updated 6 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- Code for diskless loading of ELF Shared Library using Reflective DLL Injection☆54Feb 29, 2016Updated 10 years ago
- Common Malware Techniques☆13Mar 26, 2023Updated 2 years ago
- 红方人员作战执行手册☆11Feb 22, 2020Updated 6 years ago
- An HTTP proxy that enables access to Tor Onion Services☆17Dec 16, 2021Updated 4 years ago
- Python Script for Spamming Emails with Attachments☆10Jan 4, 2020Updated 6 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hub☆15Aug 11, 2020Updated 5 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- ☆23May 20, 2016Updated 9 years ago
- Metasploit python-payload obfuscation, to allow penetration testers bypass Antivirus solutions.☆29Sep 9, 2022Updated 3 years ago
- Simple way to read wirte delete values from registry☆18Jun 24, 2019Updated 6 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Jun 27, 2019Updated 6 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Secure network block device☆11Dec 29, 2016Updated 9 years ago
- A TCP-Client connected Keylogger in C#☆12Mar 14, 2017Updated 9 years ago
- Research on abusing GitLab Runners☆31Jul 14, 2020Updated 5 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- 前端信息安全☆10Nov 8, 2017Updated 8 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- (Unofficial) Python API for https://sslbl.abuse.ch/☆11Dec 9, 2016Updated 9 years ago
- ☆43Nov 5, 2018Updated 7 years ago