morphHTA - Morphing Cobalt Strike's evil.HTA
☆10Jun 3, 2017Updated 8 years ago
Alternatives and similar repositories for morphHTA
Users that are interested in morphHTA are comparing it to the libraries listed below
Sorting:
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- Bloodhound Attack Path Automation in CobaltStrike☆30Jul 31, 2017Updated 8 years ago
- A uacbypass that works on medium IL that abuses EventViewers unsafe deserialization to RecentViews☆15Aug 29, 2023Updated 2 years ago
- Add my own POC to test Visual Studio trick to run code when building☆22Jul 18, 2017Updated 8 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Oct 3, 2013Updated 12 years ago
- A collection of Malleable C2 profiles that work with Cobalt Strike 3.x.☆30Jun 11, 2019Updated 6 years ago
- Apache Thrift Decoder☆35Dec 7, 2017Updated 8 years ago
- Tracks the ISS and when it is near your area it will send a tweet!☆12Feb 25, 2021Updated 5 years ago
- ssh user enumeration☆12Mar 21, 2023Updated 2 years ago
- Python script to parse Keytab files for macOS or *nix (typically /etc/krb5.keytab)☆41Jun 19, 2019Updated 6 years ago
- Script collection for SSH User Login notifications over Pushover.net☆12Jun 6, 2021Updated 4 years ago
- A backdoor is a tool used to gain remote access to a machine. Typically, backdoor utilities such as NetCat have 2 main functions: to pip…☆13Apr 26, 2021Updated 4 years ago
- Parses Facebook chat messages into Python objects to enable convenient analysis.☆11Jan 3, 2018Updated 8 years ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- MAGENTO implementation - CARD Processing @mobilPay☆11May 15, 2025Updated 9 months ago
- Alphabets is a learning tool that helps kids develop cognitive and psychomotor skills such as writing, drawing, and recognition of alphab…☆11May 6, 2017Updated 8 years ago
- snake-core - the real snake☆15Jul 11, 2023Updated 2 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- Web: Nextjs based Portfolio site. Rust: A TUI based portfolio of mine created using rust & tui-rs☆11Dec 11, 2024Updated last year
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 6 years ago
- Convert to and from Xcode, iOS XLIFF files <-> CSV files.☆10May 24, 2017Updated 8 years ago
- Puppet Guide☆10Jan 2, 2022Updated 4 years ago
- PyTorch code for Large-Scale Answerer in Questioner's Mind for Visual Dialog Question Generation (AQM+)☆10Feb 12, 2019Updated 7 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- This Android Demo Example Shows the Hirji(Islamic) and Gregorian Calendar. Developer can Customize the Calendar by import the Calendar …☆10Nov 11, 2019Updated 6 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Tool to brute-force the passphrase of a RSA private key in PEM format.☆12Dec 11, 2014Updated 11 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Script Center for System Center Configuration Manager☆12Jul 20, 2023Updated 2 years ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- IoT project by using MERN stack☆10Mar 16, 2023Updated 2 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- ☆10Jun 9, 2021Updated 4 years ago
- ☆11Sep 14, 2020Updated 5 years ago
- ☆15Feb 18, 2022Updated 4 years ago