USB HID for Penetration Testing
☆13Apr 6, 2016Updated 9 years ago
Alternatives and similar repositories for penteensy
Users that are interested in penteensy are comparing it to the libraries listed below
Sorting:
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- CTF write-ups☆13Jul 9, 2018Updated 7 years ago
- Download payload to disk and install it to startup then melt.☆35Apr 9, 2019Updated 6 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Writeups for Google CTF challenges 2017☆10Jun 19, 2017Updated 8 years ago
- My latest setup configs.☆10Aug 7, 2016Updated 9 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- ☆14Mar 31, 2015Updated 10 years ago
- A companion app for developers to reach out Issues, Commits and Pull-Requests on browser through their terminal☆11Feb 11, 2022Updated 4 years ago
- A Vim syntax definition for Zinit commands in any ft=zsh file☆11Mar 29, 2025Updated 11 months ago
- Loading unmanaged dll (32 and 64bits) in managed exe☆11Dec 12, 2020Updated 5 years ago
- Material utilizado na Live sobre Buffer Overflow☆10Aug 10, 2018Updated 7 years ago
- Fancy start screen for zsh! Inspired by vim-startify.☆11Jan 17, 2020Updated 6 years ago
- Zac's assorted config files☆10Jan 11, 2017Updated 9 years ago
- Detect the possible hash-types corresponding to a string, right from your terminal.☆11Jan 5, 2023Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- ☆11Jul 16, 2018Updated 7 years ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- javascript botnet browser V3 based one Cloud 9 Botnet and my botnet browser chrome. capture any web site,virtual clavier ,paypal,facebook…☆10Sep 12, 2020Updated 5 years ago
- A py3 script to bruteforce Canary and 2 next 8 values (EBP ' RET)☆11Oct 1, 2020Updated 5 years ago
- ☆10May 27, 2021Updated 4 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- 🔐 HIROO is an FUD Remote Administration Tool (RAT) Generator☆16Aug 14, 2019Updated 6 years ago
- Remote Administration Tool☆10Mar 27, 2025Updated 11 months ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- ☆12May 2, 2017Updated 8 years ago
- iOS forensics utility☆12May 8, 2018Updated 7 years ago
- Web-based BashBunny IDE☆10Mar 16, 2018Updated 7 years ago
- Library for crypt HWID(Issuance of a license)☆12Aug 7, 2021Updated 4 years ago
- Configuration File☆10Nov 26, 2019Updated 6 years ago
- Utility to track the logs during a usability test session, in order to quickly evaluate the interaction and design concepts before going …☆13Nov 4, 2020Updated 5 years ago
- littleoldearthquake☆12Jul 15, 2014Updated 11 years ago
- ImperiumRAT is an advanced remote administration tool with features like (Remote desktop, Disable CMD, Turn on/off webcam, and more!)☆12Dec 7, 2022Updated 3 years ago
- Seven different DLL injection techniques in one single project.☆12May 19, 2020Updated 5 years ago
- My configuration files☆16Feb 26, 2026Updated last week