Pick the most common user-agents on the Internet đť
â172Jan 9, 2021Updated 5 years ago
Alternatives and similar repositories for shadow-useragent
Users that are interested in shadow-useragent are comparing it to the libraries listed below
Sorting:
- "Useable" tool to share secrets via shamir secret sharing and NaCL.â14Sep 19, 2018Updated 7 years ago
- A list of backdoor samples I find online.â13Dec 16, 2019Updated 6 years ago
- â32Jun 19, 2024Updated last year
- Webinterface to execute and see the output of shellbased webscanning software, but honestly would work with every shell program.â12Apr 9, 2019Updated 6 years ago
- HoneyPot Orchestrationâ11Aug 3, 2023Updated 2 years ago
- â12Apr 21, 2019Updated 6 years ago
- A cross-platform Nim implant for Prelude Operatorâ31Jan 2, 2022Updated 4 years ago
- Capture The Flag Marker Systemâ18Oct 21, 2018Updated 7 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.â17Jul 2, 2021Updated 4 years ago
- DNS logging, detection, ...â15Mar 5, 2022Updated 4 years ago
- â18Jul 3, 2020Updated 5 years ago
- Palantir is a Lua scriptable, portable, tiny reverse shell, using a human readable protocol written in C and Lua.â18Mar 19, 2018Updated 7 years ago
- QUIC tunnelâ15Oct 28, 2017Updated 8 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.â19Jun 24, 2021Updated 4 years ago
- Proof-of-Concept to evade auditd by writing /proc/PID/memâ24Aug 21, 2023Updated 2 years ago
- Tool to download, install, and run macOS capable command & control servers (i.e., C2s with macOS payloads/clients) as docker containers fâŚâ19Dec 29, 2020Updated 5 years ago
- Phishing SSH Key Passphrases PoCâ17Mar 29, 2022Updated 3 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Freeâ22Jan 15, 2026Updated last month
- â24Sep 26, 2021Updated 4 years ago
- An improvement over the original Mimikatz wrapper.â19Aug 11, 2021Updated 4 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonationâ50Nov 30, 2020Updated 5 years ago
- Minimal Intervention and Software Transformation - PoC Packer designed for AV detection bypassâ18Nov 4, 2017Updated 8 years ago
- DLL hijacking vulnerability scanner and PE infector toolâ20Sep 8, 2017Updated 8 years ago
- Word resources for phishing. Includes "Click Enable Content" bait and decoy document deployment.â22May 16, 2018Updated 7 years ago
- WireGuard VPN server GUI with Status pageâ17Oct 5, 2021Updated 4 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018â45May 29, 2019Updated 6 years ago
- S3 bucket enumeratorâ43Dec 3, 2017Updated 8 years ago
- Rosie the Pivoterâ17Sep 2, 2018Updated 7 years ago
- VBScript minifierâ25Jan 9, 2026Updated last month
- Reflective DLL Injection style process infectorâ20Jul 23, 2018Updated 7 years ago
- Probably the first binary (PE/ELF) infector ever created in GoLang.â50May 12, 2022Updated 3 years ago
- Process Dumper written entirely in VBA.â25Feb 13, 2021Updated 5 years ago
- Certificate Export Utilityâ26May 1, 2020Updated 5 years ago
- Cloudflare compatible Reverse HTTP Shell w/ AES & Domain Fronting (via SNI) Supportâ23Jul 30, 2024Updated last year
- Watches for trigger packets, runs commands or spawns a shellâ26May 29, 2019Updated 6 years ago
- Obtains a crackable hash for the current user accountâ23Feb 3, 2019Updated 7 years ago
- Proof of Concept Exploit for CVE-2024-9465â30Oct 9, 2024Updated last year
- Caesar-Cipher based encryptionâ29Mar 1, 2021Updated 5 years ago
- â24Sep 28, 2022Updated 3 years ago