matterpreter / penteensyView external linksLinks
USB HID for Penetration Testing
☆13Apr 6, 2016Updated 9 years ago
Alternatives and similar repositories for penteensy
Users that are interested in penteensy are comparing it to the libraries listed below
Sorting:
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- This is the reconnaissance script I wrote for my OSCP journey☆14Feb 20, 2018Updated 7 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- Reverse engineering toolkit for exploit/malware analysis☆35May 10, 2020Updated 5 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- Cquery Language Server Provider package for Atom☆17Apr 16, 2020Updated 5 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Notebook for enriching and analyzing coffee roasting data from the Aillio Bullet machine and RoastTime software.☆13Apr 23, 2025Updated 9 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- The payload will search for specific files in desktop then upload them as *zip to your web server☆37Sep 24, 2019Updated 6 years ago
- A companion app for developers to reach out Issues, Commits and Pull-Requests on browser through their terminal☆11Feb 11, 2022Updated 4 years ago
- Human readable durations☆10Nov 28, 2022Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Notes and Solutions for Delimited Continuations tutorial in scheme http://pllab.is.ocha.ac.jp/~asai/cw2011tutorial/☆14Nov 4, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- 🔐 HIROO is an FUD Remote Administration Tool (RAT) Generator☆16Aug 14, 2019Updated 6 years ago
- Piet language in Ruby☆13Nov 12, 2024Updated last year
- ☆11Jul 16, 2018Updated 7 years ago
- Nexus 6P kernel source with linux-stable merged in☆13Dec 4, 2018Updated 7 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- ☆12May 2, 2017Updated 8 years ago
- Windows DLL Loading Utility☆12Jun 11, 2020Updated 5 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 10 months ago
- read gtfs-rt files in rust☆10Aug 19, 2025Updated 5 months ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A server-first virtual DOM that supports a wire format, async components, and client references out of the box.☆12Sep 12, 2023Updated 2 years ago
- Getting the best of two p2p worlds☆10Feb 17, 2022Updated 3 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- ☆14Mar 31, 2015Updated 10 years ago
- Fancy start screen for zsh! Inspired by vim-startify.☆11Jan 17, 2020Updated 6 years ago
- Command line Teensy Loader☆11Sep 21, 2015Updated 10 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- ☆11May 27, 2021Updated 4 years ago