HeadHunter Command and Control (C2)
☆20Jan 23, 2025Updated last year
Alternatives and similar repositories for HeadHunter
Users that are interested in HeadHunter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Finding and classifying ROP gadgets from rp++ output file with some regex and a CLI.☆26May 11, 2026Updated last week
- BOF POC of the DSCourier project / invoking WinGet via COM☆84Apr 23, 2026Updated 3 weeks ago
- Playing with packets in C#☆15Aug 16, 2024Updated last year
- SSH Backdoor for android☆12Oct 4, 2024Updated last year
- A CALDERA plugin☆27Mar 18, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Encoder PHP webshell to bypass WAF using XOR operations.☆55Aug 2, 2023Updated 2 years ago
- OSCP Buffer Overflow in 30 minutes☆37Jun 12, 2019Updated 6 years ago
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17May 19, 2024Updated 2 years ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆46Aug 12, 2025Updated 9 months ago
- Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.☆20Jul 3, 2024Updated last year
- ☆12Aug 29, 2024Updated last year
- Rust crate for obfuscating string literals.☆13Feb 2, 2023Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆46Sep 25, 2024Updated last year
- SubCortex is a fast and efficient tool for passive subdomain enumeration. It aggregates subdomain data from multiple APIs, helping penetr…☆16Jul 10, 2025Updated 10 months ago
- A simple multithreaded SSH credential tester.☆14Jun 6, 2025Updated 11 months ago
- Docker kinsing malware bitcoin/xmr miner☆22Feb 18, 2021Updated 5 years ago
- 一个窃取谷歌浏览器保存的密码的示例程序,不会被杀毒软件识别,提示大家对数据安全的注意!(A sample program that steals passwords saved in Google Chrome without being detected by antiv…☆10Jul 20, 2023Updated 2 years ago
- CROSS PLATFORM MULTI NETCAT SERVER☆13Sep 17, 2025Updated 8 months ago
- Youtube channel sample code☆58May 9, 2026Updated last week
- POC tool to abuse windows server failover clusters☆56Aug 7, 2025Updated 9 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Sep 20, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Aug 13, 2024Updated last year
- a virus project that uses discord as a reverse shell, has a lot of functions and is easy to use☆16May 12, 2025Updated last year
- AXIS Botnet☆16May 16, 2024Updated 2 years ago
- powershell免杀,Invoke-Obfuscation-Bypass分析和修改☆17Apr 13, 2023Updated 3 years ago
- ☆18Jan 5, 2024Updated 2 years ago
- Pegasus Is A Tool Wich Has 9 Functions. Pegasus Uses Discord as C2.☆17Jan 12, 2023Updated 3 years ago
- UEFI bootkit: Hardware Implant. In-Progress☆15Mar 7, 2022Updated 4 years ago
- Challenge 1 of The Auror Project - Setup AD Lab automatically☆12Apr 26, 2022Updated 4 years ago
- Minero is a simple bot that helps run crypto mining application based on profitability☆19Dec 26, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept circumventing arxan's integrity checks.☆56Apr 14, 2025Updated last year
- A tool to check the correctness of email and password☆21Feb 26, 2024Updated 2 years ago
- Some of the techniques used in Malware Windows - Persistence(Registry HKCU,startup),Disable Windows Firewall,Disable Windows Defender☆24Nov 20, 2022Updated 3 years ago
- The SSH Bruteforce repository consists of two Python scripts designed for password cracking on SSH servers. One script employs asynchrono…☆16Jul 8, 2023Updated 2 years ago
- 一款强大的内网信息收集工具,支持文件、文件夹、文件内容、命令、注册表、进程、mimikatz命令、dpapi、最近访问收集,且支持定制化配置,只需更新配置文件,定义收集规则,即可开启对各类浏览器、remote工具、聊天软件进行凭据、信息收集☆22Oct 16, 2022Updated 3 years ago
- testing poc☆16Oct 18, 2023Updated 2 years ago
- CLI and Go package for fast, offline ASN lookups☆22Feb 27, 2025Updated last year