☆16May 6, 2015Updated 10 years ago
Alternatives and similar repositories for PowerW0rm
Users that are interested in PowerW0rm are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- Jar Protector - Jar Crypter☆15May 18, 2018Updated 7 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- C# code to run shellcode in a sneaky way☆93Oct 2, 2020Updated 5 years ago
- Useful Threat Hunting Stuff☆32Sep 1, 2020Updated 5 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Port of eternal blue exploits to powershell☆151Jun 3, 2017Updated 8 years ago
- Uses AES to run encrypted shellcode using Python and ctypes☆14Jan 17, 2016Updated 10 years ago
- Quantum zero-day exploit Hunting for vulnerabilities as small as a quantum particle☆13Jun 13, 2025Updated 10 months ago
- ☆41Jul 4, 2018Updated 7 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- ☆20Sep 8, 2019Updated 6 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- Cobalt Strike cna script for randomized argument spoofing☆51Apr 4, 2019Updated 7 years ago
- exploit for CVE-2018-4193☆69Feb 13, 2019Updated 7 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- ☆30Jul 17, 2018Updated 7 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- Powershell fork of Monohard by Carlos Ganoza P. This botnet/backdoor was designed to egress over unecrypted web using very little, but e…☆40Oct 14, 2021Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- DNSDelivery provides delivery and in memory execution of shellcode or .Net assembly using DNS requests delivery channel.☆145Oct 6, 2019Updated 6 years ago
- DLL to use the power of Pafish☆32Oct 5, 2021Updated 4 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- WMI Event Subscription Persistence in C#☆112May 29, 2019Updated 6 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Brahmastra empowers security teams to fortify their defenses and identify potential vulnerabilities in their systems. This comprehensive …☆18Aug 20, 2023Updated 2 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- When CactusTorch meets WebDavDelivery and obfuscation☆63Sep 19, 2017Updated 8 years ago
- Memcache hacking tool.☆47Apr 20, 2017Updated 9 years ago
- Red team oriented key finder and correlator☆21Nov 21, 2025Updated 4 months ago
- Eureka is a forensic open source search tool that identifies specific structures in very, very large files (mostly, in memory dumps).☆19Mar 21, 2024Updated 2 years ago
- ☆86Jul 15, 2015Updated 10 years ago
- tiny wrapper around Windows Management Instrumentation API☆13Nov 9, 2018Updated 7 years ago
- Provides In-memory compilation and reflective loading of C# apps for AV evasion.☆372Feb 23, 2024Updated 2 years ago