Quick and simple way to encrypt your code via OpenSSL with a key size of 16, 24 or 32 to protect your code from being seen
☆16Jan 19, 2020Updated 6 years ago
Alternatives and similar repositories for encrypted-web-shell
Users that are interested in encrypted-web-shell are comparing it to the libraries listed below
Sorting:
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- String obfuscation in GO☆14Sep 19, 2019Updated 6 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- A tool for communicating with FingerTec access control devices, as well as other ZKTeco based devices☆21Jan 10, 2017Updated 9 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Abusing Reddit API to host the C2 traffic, since most of the blue-team members use Reddit, it might be a great way to make the traffic lo…☆24Jan 23, 2023Updated 3 years ago
- ☆21Oct 22, 2019Updated 6 years ago
- Source code of my KeygenMe V7 challenge☆22Jul 19, 2018Updated 7 years ago
- ☆22May 20, 2016Updated 9 years ago
- desktop screenshot☆29Apr 26, 2023Updated 2 years ago
- PhpSecInfo provides an equivalent to the phpinfo() function that reports security information about the PHP environment, and offers sugge…☆47Sep 11, 2011Updated 14 years ago
- ☆27May 29, 2015Updated 10 years ago
- ☆28Oct 5, 2020Updated 5 years ago
- A DLL that serves OutputDebugString content over a TCP connection☆35Sep 23, 2021Updated 4 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- 前端信息安全☆10Nov 8, 2017Updated 8 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- Custom Python 2.7 RAT☆10May 25, 2016Updated 9 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- The exploit for Panda AV LPE☆37May 22, 2019Updated 6 years ago
- Arduino+Si5351 = Antenna/Network Analyzer☆13Feb 10, 2019Updated 7 years ago
- Helper scripts to assist penetration testing and exploit development☆35Dec 11, 2024Updated last year
- Copy of the contents at phrack.com☆41Mar 18, 2025Updated 11 months ago
- Encrypt C functions☆41Jun 17, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- This repository provides examples that demonstrates how to develop PSoC 4 MCU based analog designs. These examples help you to use periph…☆15Oct 27, 2018Updated 7 years ago
- PHP Application To Spoof And Send E-mail.☆10Jan 4, 2016Updated 10 years ago
- Gophish Python cli to perform huge phishing campaigns☆39Oct 19, 2018Updated 7 years ago
- ZipCrack with Python☆10Sep 8, 2017Updated 8 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Shellcode Of Death☆43Aug 31, 2013Updated 12 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- ☆43Nov 5, 2018Updated 7 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Aug 26, 2013Updated 12 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago