☆21Oct 3, 2021Updated 4 years ago
Alternatives and similar repositories for Verilaptor
Users that are interested in Verilaptor are comparing it to the libraries listed below
Sorting:
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Babuk v2☆11Sep 28, 2021Updated 4 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Jan 28, 2019Updated 7 years ago
- ☆17Nov 14, 2022Updated 3 years ago
- A SMTP Checker / SMTP Cracker with SOCKS support and e-mail delivery test (inbox check) for mailpass combolists.☆16Jan 16, 2022Updated 4 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Bruteforce tool for Pentester's lucky day targeting SSH-services.☆12Nov 27, 2020Updated 5 years ago
- Reset Excel sheet and workbook protection☆10Jun 23, 2019Updated 6 years ago
- HWR0's Shield Designs for the MorphESP 240 by @ccadic☆13Oct 7, 2021Updated 4 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- Python interface for ADT Pulse security systems☆16Nov 29, 2025Updated 3 months ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- support code for the Bugblat USB sniffers☆15Jun 8, 2021Updated 4 years ago
- ☆81May 20, 2022Updated 3 years ago
- Notes on the QMTECH ZYNQ XC7Z020 starter kit☆15Jul 2, 2025Updated 8 months ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- CVE-2022-22963 Spring-Cloud-Function-SpEL_RCE_exploit☆15Mar 30, 2022Updated 3 years ago
- Build myself for cs project☆12Oct 29, 2020Updated 5 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- A minimalistic android backdoor☆19Aug 1, 2020Updated 5 years ago
- Load the evilDLL from socket connection without touch disk☆15Aug 27, 2021Updated 4 years ago
- the metasploit script(POC/EXP) about CVE-2021-22005 VMware vCenter Server contains an arbitrary file upload vulnerability☆22Oct 2, 2021Updated 4 years ago
- A possible method for faster-than-light communication☆43Jan 28, 2024Updated 2 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- ☆17May 18, 2022Updated 3 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Enable RDP and set firewall by Windows API.☆21Mar 3, 2022Updated 4 years ago
- Set your VPS with docker for multiple websites☆16Jul 12, 2016Updated 9 years ago
- Simple voltage glitcher implementation for the Lattice iCEstick Evaluation Kit☆61Jan 30, 2020Updated 6 years ago
- Build scripts for tor binary☆24Feb 23, 2026Updated last week
- C# 编写的用于 Dropbox 文件上传☆20Jan 16, 2022Updated 4 years ago
- Raiden project☆24Nov 7, 2021Updated 4 years ago
- A python ransomware integrated with discord webhooks, fast and clean.☆15Dec 30, 2021Updated 4 years ago
- Zimbra RCE PoC - CVE-2019-9670 XXE/SSRF☆27Aug 16, 2019Updated 6 years ago
- ARCHIE is a QEMU-based architecture-independent fault evaluation tool, that is able to simulate transient and permanent instruction and d…☆33Jan 3, 2026Updated 2 months ago
- Backdoor&后渗透工具☆21Aug 10, 2021Updated 4 years ago